DSAB – A Hybrid Approach for Providing Security in MANET
Year 2012,
Volume: 1 Issue: 3, 82 - 87, 29.09.2012
Gulshan Kumar
Rahul Saha
Mritunjay Rai
Abstract
With the pace of life, technology has also been evolved. We have moved from the fixed transmission to the mobility aspect. MANETs in todays’ environment is of great importance. The dynamic feature of MANETs makes the networks vulnerable to different security attacks. So it is great concern to provide security and authentication along with power utilization and robustness for the MANETs for successful transmission. In our following paper we have introduced our novel hybrid security approach by using digital signature (DSA) with Blowfish algorithm (DSAB) and compared its performance with existing encryption techn Authoriques like AES, DES. This article is an extension of the article submitted to ISCTUREY 2012.
References
- H.M. Kader and M.M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms," Performance Evaluation, pp. 58-64, 2009.
- W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
- M.N. Islam, M. Mia, M. Chowdhury, M.A.Matin, ”Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Ninth ACIS International Conference Intelligence, Computing, 2008 (SNPD '08). 6-8 Aug. 2008, pp.291– 294, Phuket, Thailand. Engineering, and
- Parallel/Distributed
- A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks”, In Proceedings of PerCom pp.324-328, 2005.
- S. Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1,2008.
- G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
Year 2012,
Volume: 1 Issue: 3, 82 - 87, 29.09.2012
Gulshan Kumar
Rahul Saha
Mritunjay Rai
References
- H.M. Kader and M.M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms," Performance Evaluation, pp. 58-64, 2009.
- W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
- M.N. Islam, M. Mia, M. Chowdhury, M.A.Matin, ”Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Ninth ACIS International Conference Intelligence, Computing, 2008 (SNPD '08). 6-8 Aug. 2008, pp.291– 294, Phuket, Thailand. Engineering, and
- Parallel/Distributed
- A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks”, In Proceedings of PerCom pp.324-328, 2005.
- S. Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1,2008.
- G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.