Letter To Shape Encryption For Securing MANET Routing Protocols

被引:0
|
作者
Maheswary, A. [1 ]
Baskar, S. [1 ]
机构
[1] VELTECH Univ, Chennai, Tamil Nadu, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH | 2016年
关键词
MANET; Encryption; Decryption; RSA algorithm; Key distribution; man-in-middle attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.
引用
收藏
页码:534 / 537
页数:4
相关论文
共 50 条
  • [1] Certification and authentication services for securing MANET routing protocols
    Puttini, RS
    Me, L
    de Sousa, RT
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2003, : 278 - 281
  • [2] Resilient enhancements of routing protocols in MANET
    Baumgartner, Maros
    Papaj, Jan
    Kurkina, Natalia
    Dobos, Lubomir
    Cizmar, Anton
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3200 - 3221
  • [3] A Survey of Reactive Routing Protocols in MANET
    Patel, Daxesh N.
    Patel, Sejal B.
    Kothadiya, Hemangi R.
    Jethwa, Pinakin D.
    Jhaveri, Rutvij H.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [4] Review on MANET Routing Protocols and Challenges
    Habib, Shabana
    Saleem, Somaila
    Saqib, Khawaja Muhammad
    2013 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2013), 2013, : 529 - 533
  • [5] A Comparative Study of MANET Routing Protocols
    Alslaim, Mona N.
    Alaqel, Haifaa A.
    Zaghloul, Soha S.
    2014 THIRD INTERNATIONAL CONFERENCE ON E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT (ICEND), 2014, : 178 - 182
  • [6] A Survey on Anonymous Routing Protocols in MANET
    Varghese, Shino Sara
    Raja, J. Immanuel John
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 88 - +
  • [7] MANETkit: A Framework for MANET Routing Protocols
    Ramdhany, Rajiv
    Coulson, Geoff
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 301 - 316
  • [8] Routing Protocols and Security Issues in MANET
    Kumar, Sandeep
    Goyal, Monika
    Goyal, Deepak
    Poonia, Ramesh C.
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 818 - 824
  • [9] Enforcing Collaboration in MANET Routing Protocols
    Bella, Giampaolo
    Costantino, Gianpiero
    Riccobene, Salvatore
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 128 - 133
  • [10] Performance Comparison of Routing Protocols in MANET
    Kukreja, Bharti
    Kambhra, Sanjeev
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 108 - 114