Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Encryption Protocol for Securing MANET-L to S

Author : P.N. Sharath sagar reddy 1 Manasa.S 2 Anitha A 3 Jhansi Rani 4 Sheela Devi 5 Sowmya.A.M 6

Date of Publication :16th May 2017

Abstract: Mobile ad hoc network are a kind of wireless ad hoc network that usually has a routable networking environment on top of a link layer ad hoc network. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.

Reference :

    1. NFS Wireless Information Technology and Networks Program Announcement, NSF 99-68, 1999.
    2. Report to the President, Information Technology: Transforming our Society, PITAC Report,February 1999.
    3. NFS Wireless and Mobile Communications Workshop, Northern Virginia, March, 1997.
    4. Kamal Kumar Chauhan, Amit Kumar Singh Sanger, Virendra Singh Kushwah, “Securing OnDemand Source Routing in MANETs ”,IEEE Explore Digital library, 2010, pp:294-297.
    5. C. Pfleeger and D. Cooper, Security and privacy: Promising advances, IEEE Software, 1997.
    6. C. Perkins, Ad Hoc Networking, Reading, MA: Addison Wesley, 2001.
    7. B. R. Smith, S. Murphy, and J. J. GarciaLuna-Aceves, Securing distance-vector routing protocol,in Proceedings Symposium Networking and Distribution Systems Security, 1997, pp. 85–92.
    8. Y. Zhang and W. Lee, Intrusion detection in wireless ad hoc networks, IEEE/ACM MobiCom Proc., 2000, pp. 275–283.
    9. Alka.p.Sawlikar, Dr.Z.J.Khan, Dr. S.G.Akojwar, “A new approach of compression and encryption algorithm”, International journal of Advanced Research in computer science and software engineering, Vol 6, Issue 4, April-2016, pp-394-397.
    10. Hamdy M.Mousa, “International journal of computer network and Information Security”, July 2016, 7, 1-9.
    11. Samrees Sekhon Brar, Ajitpal Brar, “ Double layer image security system using encryption and steganography”, Internation Journal of Computer Network and Information Security, March 2016, 3, 27-33.
    12. Manas Paul , Jyotsna Kumar Mandal ,” A General Session Based Bit Level Block Encoding Technique Using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.3, pp-31-42,June 2012
    13. Dayanand Sharma , Abhijit Kulshreshtha, Shrawan Ram, “Network Security Challenges and Cryptography in Network Security”, J. Comp. & Math. Sci. Vol.2 (1), 25-30 (2011)
    14. Nitin K. Jharbade,Rajesh Shrivastava, “Network based Security model using Symmetric Key Cryptography (AES 256– Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)”, IJCSNS International Journal of Compute Science and Network Security, vol.12 No.8, pp 69-74, August 2012
    15. P. Chakrabarti, B Bhuya, A.Chowdhuri, C.T.Bhunia, “A novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5,pp-241-250, May 2008
    16. Suvajit Dutta, Tanumay Das, Sharad Jash, Debasish Patra, Dr.Pranam Paul,” A Cryptography Algorithm Using the Operations of Genetic Algorithm &Pseudo Random Sequence Generating Functions”, International Journal of Advances in Computer Science and Technology, Volume 3, No.5, pp 325-331, ISSN 2320 – 2602,May 2014.
    17. Aruna Tomar, Sunita Malik, “ A Random Key Based Visual Cryptography Approach for Information Security “, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 6, pg.432 – 437, ISSN 2320–088X, June 2014.
    18. Aruna Tomar, Sunita Malik, “ A Random Key Based Visual Cryptography Approach for Information Security “, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 6, pg.432 – 437, ISSN 2320–088X, June 2014. (IJSETR), Volume 3, Issue 3 pp 539-544, ISSN: 2278 – 7798,March 2014
    19. Deepti A. Chaudhari, Prof. S. B. Javheri, “An Intrusion Detection System for MANET using Hybrid Cryptography”, International Journal of Advance Researn in Computer Science and Management Science, Volume 3, Issue 1, pp 347-352, ISSN 2321 – 7782,January 2015.
    20. R. Rivest, The MDS message-digest algorithm, RFC286, Internet Engineering Task Force,Symbolic, Inc., 1982.

Recent Article