Letter To Shape Encryption For Securing MANET Routing Protocols

被引:0
|
作者
Maheswary, A. [1 ]
Baskar, S. [1 ]
机构
[1] VELTECH Univ, Chennai, Tamil Nadu, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH | 2016年
关键词
MANET; Encryption; Decryption; RSA algorithm; Key distribution; man-in-middle attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.
引用
收藏
页码:534 / 537
页数:4
相关论文
共 50 条
  • [21] MANET Routing Protocols with Emphasis on Zone Routing Protocol - an Overview
    Kurode, Eesha
    Vora, Naishadh
    Patil, Sachin
    Attar, Vahida
    2021 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2021,
  • [22] The behavior of MANET routing protocols in realistic environments
    Chin, KW
    2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 906 - 910
  • [23] Performance Study of MANET Routing Protocols in VANET
    Barakat Pravin Maratha
    Tarek R. Sheltami
    Khaled Salah
    Arabian Journal for Science and Engineering, 2017, 42 : 3115 - 3126
  • [24] Review of Ant based Routing Protocols for MANET
    Kalaavathi, B.
    Madhavi, S.
    VijayaRagavan, S.
    Duraiswamy, K.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 42 - +
  • [25] Performance Study of MANET Routing Protocols in VANET
    Maratha, Barakat Pravin
    Sheltami, Tarek R.
    Salah, Khaled
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) : 3115 - 3126
  • [26] Proactive Routing Protocols For a MANET- A Review
    Shruthi, S.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 821 - 827
  • [27] Privacy and Security on Anonymous Routing Protocols in MANET
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 431 - +
  • [28] A COMPREHENSIVE STUDYABOUT VARIOUS MANET ROUTING PROTOCOLS
    Vikram, R.
    Jaganath, M.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2019, : 113 - 118
  • [29] Performance Analysis of Different MANET Routing Protocols
    Mukherjee, Srijan
    Mohapatra, Hitesh
    2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [30] Performance Evaluation of MANET and DTN Routing Protocols
    Almeida, Virgil Del Duca
    Oliveira, Andre B.
    Macedo, Daniel F.
    Nogueira, Jose Marcos S.
    2012 IFIP WIRELESS DAYS (WD), 2012,