Letter To Shape Encryption For Securing MANET Routing Protocols

被引:0
|
作者
Maheswary, A. [1 ]
Baskar, S. [1 ]
机构
[1] VELTECH Univ, Chennai, Tamil Nadu, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH | 2016年
关键词
MANET; Encryption; Decryption; RSA algorithm; Key distribution; man-in-middle attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.
引用
收藏
页码:534 / 537
页数:4
相关论文
共 50 条
  • [41] Performance of service location protocols in MANET based on reactive routing protocols
    Seo, HG
    Kim, KH
    Jung, WD
    Park, JS
    Jo, SH
    Shin, CM
    Park, SM
    Kim, HN
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 234 - 241
  • [42] On securing MANET routing protocol against control packet dropping
    Djenouri, Djamel
    Mahmoudi, Othmane
    Bouamama, Mohamed
    Llewellyn-Jones, David
    Merabti, Madjid
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 100 - +
  • [43] Securing Zone Routing Protocol in MANET using Authentication Technique
    Rajput, Shyam Singh
    Trivedi, Munesh C.
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 872 - 877
  • [44] Performance Evaluation of Mobility Models on MANET Routing Protocols
    Gupta, Pragya
    Gupta, Sudha
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 248 - 253
  • [45] Performance Comparison between Multicast Routing Protocols in MANET
    Adhvaryu, K. U.
    Kamboj, Pariza
    2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), 2017, : 16 - 20
  • [46] MANET Routing Protocols Problem For The Marginal Mobility Model
    Tudorache, Ion Gabriel
    Popescu, Ana Maria
    Kemp, A. H.
    2011 41ST EUROPEAN MICROWAVE CONFERENCE, 2011, : 139 - 142
  • [47] Effect of Network Density on the Performance of MANET Routing Protocols
    Khan, Latif Ullah
    Khan, Faheem
    Khan, Naeem
    Khan, M. Naeem
    Pirzada, Bilal
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 1089 - 1092
  • [48] Performance Analysis of MANET Routing Protocols: OLSR and TORA
    Altalhi, Abdulrahman H.
    Halawani, Sami M.
    Mahmood, Tahir
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (03): : 54 - 59
  • [49] Performance Evaluation of Multipath Source Routing Protocols in MANET
    Jayalakshmi, V
    Kumar, Ramesh R.
    Geetha, S.
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 396 - +
  • [50] Comprehensive Study of Routing Protocols in Adhoc Network: MANET
    Sharma, Manmohan
    Singh, Mohanjeet
    Walia, Kirti
    Kaur, Kanwalpreet
    2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 792 - 797