Letter To Shape Encryption For Securing MANET Routing Protocols

被引:0
|
作者
Maheswary, A. [1 ]
Baskar, S. [1 ]
机构
[1] VELTECH Univ, Chennai, Tamil Nadu, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH | 2016年
关键词
MANET; Encryption; Decryption; RSA algorithm; Key distribution; man-in-middle attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.
引用
收藏
页码:534 / 537
页数:4
相关论文
共 50 条
  • [31] Analysis of Multicast Routing Protocols for Secure Manet
    Maragatharajan, M.
    Balakannan, S. P.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [32] Study of Routing Protocols in MANET- A Review
    Sharma, Neha
    Ali, Shahjahan
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1245 - 1249
  • [33] Research Article on Routing Protocols for MANET: A Review
    Thapar, Shruti
    Rao, M. Venu Gopala
    Jain, Babita
    Sharma, Rohan
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 2939 - 2949
  • [34] A SURVEY ON CROSS LAYER ROUTING PROTOCOLS FOR MANET
    Manpreet
    Malhotra, Jyoteesh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [35] Performance comparison of geocast routing protocols for a MANET
    Yao, P
    Krohne, E
    Camp, T
    ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 213 - 220
  • [36] Performance Measure Modeling Of Routing Protocols In MANET
    Kaur, Anmol Preet
    Chowdhary, Nitika
    Malhotra, Jyoteesh
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 215 - 228
  • [37] A Survey - Energy Efficient Routing Protocols in MANET
    Upadhyaya, Jyoti
    Manjhi, Nitin
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (05): : 163 - 168
  • [38] Study and Analysis of Opportunistic Routing Protocols in MANET
    Alleema, Noor N.
    Sivakumar, D.
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGICAL INNOVATIONS IN ICT FOR AGRICULTURE AND RURAL DEVELOPMENT TIAR 2015, 2015, : 139 - 143
  • [39] Securing distance-vector routing protocols
    Smith, BR
    Murthy, S
    GarciaLunaAceves, JJ
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 85 - 92
  • [40] Recent developments in securing Internet routing protocols
    He, L.
    BT TECHNOLOGY JOURNAL, 2006, 24 (04) : 180 - 196