BibTex RIS Cite

DSAB – A Hybrid Approach for Providing Security in MANET

Year 2012, Volume: 1 Issue: 3, 82 - 87, 29.09.2012

Abstract

With the pace of life, technology has also been evolved. We have moved from the fixed transmission to the mobility aspect. MANETs in todays’ environment is of great importance. The dynamic feature of MANETs makes the networks vulnerable to different security attacks. So it is great concern to provide security and authentication along with power utilization and robustness for the MANETs for successful transmission.  In our following paper we have introduced our novel hybrid security approach by using digital signature (DSA) with Blowfish algorithm (DSAB) and compared its performance with existing encryption techn Authoriques like AES, DES. This article is an extension of the article submitted to ISCTUREY 2012.

References

  • H.M. Kader and M.M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms," Performance Evaluation, pp. 58-64, 2009.
  • W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
  • M.N. Islam, M. Mia, M. Chowdhury, M.A.Matin, ”Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Ninth ACIS International Conference Intelligence, Computing, 2008 (SNPD '08). 6-8 Aug. 2008, pp.291– 294, Phuket, Thailand. Engineering, and
  • Parallel/Distributed
  • A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks”, In Proceedings of PerCom pp.324-328, 2005.
  • S. Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1,2008.
  • G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
Year 2012, Volume: 1 Issue: 3, 82 - 87, 29.09.2012

Abstract

References

  • H.M. Kader and M.M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms," Performance Evaluation, pp. 58-64, 2009.
  • W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
  • M.N. Islam, M. Mia, M. Chowdhury, M.A.Matin, ”Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Ninth ACIS International Conference Intelligence, Computing, 2008 (SNPD '08). 6-8 Aug. 2008, pp.291– 294, Phuket, Thailand. Engineering, and
  • Parallel/Distributed
  • A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks”, In Proceedings of PerCom pp.324-328, 2005.
  • S. Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1,2008.
  • G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
There are 7 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Gulshan Kumar This is me

Rahul Saha This is me

Mritunjay Rai This is me

Publication Date September 29, 2012
Submission Date January 30, 2016
Published in Issue Year 2012 Volume: 1 Issue: 3

Cite

IEEE G. Kumar, R. Saha, and M. Rai, “DSAB – A Hybrid Approach for Providing Security in MANET”, IJISS, vol. 1, no. 3, pp. 82–87, 2012.