Skip to main content

2016 | OriginalPaper | Buchkapitel

An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks

verfasst von : Kuncha Sahadevaiah, Nagendla Ramakrishnaiah, P. V. G. D. Prasad Reddy

Erschienen in: Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like—unavailable central infrastructure services, periodic movable nodes, wireless link unsteadiness, and possible network separations. In this paper, we present a cryptographic key management scheme for secure communications in ad hoc networks. The scheme transmits the data in the presence of security attacks. The scheme provides the scalability of nodes and storage space wherein the nodes makes use of more than one key pair to encrypt and decrypt the messages. The scheme has been executed in Java programming language and empirically valued its efficiency via performance and security assessments. The simulation outcome has shown that the proposed scheme opposes against selfish nodes and takes less key storage space than traditional schemes. The scheme also satisfies the secure communication requirements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Kluwer Academic Publishers (2006) Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Kluwer Academic Publishers (2006)
2.
Zurück zum Zitat Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education (2006) Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education (2006)
3.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security: Principles and Practice. 4th edn. Prentice Hall (2005) Stallings, W.: Cryptography and Network Security: Principles and Practice. 4th edn. Prentice Hall (2005)
4.
Zurück zum Zitat Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996) Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
5.
Zurück zum Zitat Gandhi, C., Dave, M.: A review of security in mobile ad hoc networks. IETE Tech. Rev. 23(6), 335–344 (2006)CrossRef Gandhi, C., Dave, M.: A review of security in mobile ad hoc networks. IETE Tech. Rev. 23(6), 335–344 (2006)CrossRef
6.
Zurück zum Zitat Choi, D., Younho, L.E.E., Yongsu, P.A.R.K., JIN, S.H., Yoon, H.: Efficient and secure self organized public key management for mobile ad hoc networks. IEICE Trans. Commun. E91–B(11), 3574–3583 (2008) Choi, D., Younho, L.E.E., Yongsu, P.A.R.K., JIN, S.H., Yoon, H.: Efficient and secure self organized public key management for mobile ad hoc networks. IEICE Trans. Commun. E91–B(11), 3574–3583 (2008)
7.
Zurück zum Zitat Dahshan, H., Irvine, J.: A Robust Self-Organized Public Key Management for Mobile Ad Hoc Networks. Security Communication Networks, Wiley InterScience, vol. 3, pp. 16–30, (2009) Dahshan, H., Irvine, J.: A Robust Self-Organized Public Key Management for Mobile Ad Hoc Networks. Security Communication Networks, Wiley InterScience, vol. 3, pp. 16–30, (2009)
8.
Zurück zum Zitat Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)CrossRef Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)CrossRef
9.
Zurück zum Zitat Capkun, S., Hubaux, J., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5(1), 43–51 (2006)CrossRef Capkun, S., Hubaux, J., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5(1), 43–51 (2006)CrossRef
10.
Zurück zum Zitat Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad Hoc Networks. Elsevier’s Computers and Security, pp. 199–214 (2009) Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad Hoc Networks. Elsevier’s Computers and Security, pp. 199–214 (2009)
11.
Zurück zum Zitat He, W., Huang, Y., Ravishankar, S., Nahrstedt, K., Lee, W.C.: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad hoc networks. IEEE Trans. Forensics Secur. 4(1), 140–150 (2009)CrossRef He, W., Huang, Y., Ravishankar, S., Nahrstedt, K., Lee, W.C.: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad hoc networks. IEEE Trans. Forensics Secur. 4(1), 140–150 (2009)CrossRef
12.
Zurück zum Zitat Yi-Chun, Hu, Perrig, Adrian: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef Yi-Chun, Hu, Perrig, Adrian: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef
13.
Zurück zum Zitat Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: Proceedings of IEEE 6th International Conference on Information, Communications and Signal Processing, pp. 1–5 (2007) Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: Proceedings of IEEE 6th International Conference on Information, Communications and Signal Processing, pp. 1–5 (2007)
Metadaten
Titel
An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks
verfasst von
Kuncha Sahadevaiah
Nagendla Ramakrishnaiah
P. V. G. D. Prasad Reddy
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30927-9_48