Skip to main content
Top
Published in: Cluster Computing 5/2019

12-02-2018

A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks

Authors: T. Kavitha, R. Muthaiah

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Message security is most imperative in mobile ad hoc networks because of the applications in circumstances such as, disaster rescue, crisis management and military. Yet, due to the absence of a fixed framework and no centralized administration implementation of security is a testing prospect. Also certain attention must be paid to energy utilization constraints while designing a security mechanism for a mobile ad hoc network. This paper presents a method which considers aforementioned constraints and suggests a non-interactive light weight symmetric key cryptosystem using fast Fourier transform based hashing and generalised symbol table based polyalphabetic substitution. The key computation and secure hashing mechanism strengthen the proposed technique and is proved to be resilient enough against the non-legitimate users with less overhead to participating nodes. The analysis on the proposed technique is performed on various sets of data with different sized network to comprehend the level of security achieved.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.: Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.: Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef
3.
go back to reference Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)MathSciNetCrossRef Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)MathSciNetCrossRef
4.
go back to reference Sanzgiri, K., Laflamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23, 598–609 (2005)CrossRef Sanzgiri, K., Laflamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23, 598–609 (2005)CrossRef
5.
go back to reference Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38, 243–250 (1994)CrossRef Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38, 243–250 (1994)CrossRef
7.
go back to reference Yang, Y.: Broadcast encryption based non-interactive key distribution in MANETs. J. Comput. Syst. Sci. 80, 533–545 (2014)CrossRef Yang, Y.: Broadcast encryption based non-interactive key distribution in MANETs. J. Comput. Syst. Sci. 80, 533–545 (2014)CrossRef
8.
go back to reference Ramkumar, M., Memon, N.: An efficient key predistribution scheme for ad hoc network security. IEEE J. Sel. Areas Commun. 23, 611–621 (2005)CrossRef Ramkumar, M., Memon, N.: An efficient key predistribution scheme for ad hoc network security. IEEE J. Sel. Areas Commun. 23, 611–621 (2005)CrossRef
9.
go back to reference Yin, Y., Gan, Y., Wen, H., Li, T.: A symmetric key exchange protocol based on virtual S-box. China Commun. 11, 46–52 (2014)CrossRef Yin, Y., Gan, Y., Wen, H., Li, T.: A symmetric key exchange protocol based on virtual S-box. China Commun. 11, 46–52 (2014)CrossRef
10.
go back to reference Peterson, H., Michels, M.: Cryptanalysis and improvements of signcryption schemes. IEE Proc. Comput. Digit. Techn. 145, 149–151 (1998)CrossRef Peterson, H., Michels, M.: Cryptanalysis and improvements of signcryption schemes. IEE Proc. Comput. Digit. Techn. 145, 149–151 (1998)CrossRef
11.
go back to reference Yavuz, A.A., Alagöz, F., Anarim, E.: A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk. J. Electr. Eng. Comput. Sci. 18, 1–21 (2010) Yavuz, A.A., Alagöz, F., Anarim, E.: A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk. J. Electr. Eng. Comput. Sci. 18, 1–21 (2010)
12.
go back to reference Enos, G., Zheng, Y.: An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. Inf. Process. Lett. 115, 128–133 (2015)MathSciNetCrossRef Enos, G., Zheng, Y.: An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. Inf. Process. Lett. 115, 128–133 (2015)MathSciNetCrossRef
13.
go back to reference Kumar, G.P., Murmu, A.K., Parajuli, B., Choudhury, P.: MULET: A multi language encryption technique. In: IEEE 2010 Information Technology—New Generations Conference, Las Vegas, NV, pp. 779–782. IEEE (2010) Kumar, G.P., Murmu, A.K., Parajuli, B., Choudhury, P.: MULET: A multi language encryption technique. In: IEEE 2010 Information Technology—New Generations Conference, Las Vegas, NV, pp. 779–782. IEEE (2010)
14.
go back to reference Battey, M., Parakh, A.: An efficient quasigroup block cipher. Wirel. Pers. Commun. 73, 63–76 (2013)CrossRef Battey, M., Parakh, A.: An efficient quasigroup block cipher. Wirel. Pers. Commun. 73, 63–76 (2013)CrossRef
15.
go back to reference Echchaachoui, A., Choukri, A., Habbani, A., Elkoutbi, M.: Asymmetric and dynamic encryption for routing security in MANETs. IEEE 2014 Multimedia Computing and Systems Conference, Marrakech, pp. 825–830. IEEE, Morocco (2014) Echchaachoui, A., Choukri, A., Habbani, A., Elkoutbi, M.: Asymmetric and dynamic encryption for routing security in MANETs. IEEE 2014 Multimedia Computing and Systems Conference, Marrakech, pp. 825–830. IEEE, Morocco (2014)
16.
go back to reference Ramanarayana, K., Jacob, L.: Secure routing in integrated mobile ad hoc network (MANET)-internet. In: IEEE 2007 Security. Privacy and Trust in Pervasive and Ubiquitous Computing Workshop, Istanbul, Turkey, pp. 19–24. IEEE (2007) Ramanarayana, K., Jacob, L.: Secure routing in integrated mobile ad hoc network (MANET)-internet. In: IEEE 2007 Security. Privacy and Trust in Pervasive and Ubiquitous Computing Workshop, Istanbul, Turkey, pp. 19–24. IEEE (2007)
17.
go back to reference Chen, J., Lim, H.W., Ling, S., Wang, H., Wee, H.: Shorter identity-based encryption via asymmetric pairings. Des. Code Cryptogr. 73, 911–947 (2014)MathSciNetCrossRef Chen, J., Lim, H.W., Ling, S., Wang, H., Wee, H.: Shorter identity-based encryption via asymmetric pairings. Des. Code Cryptogr. 73, 911–947 (2014)MathSciNetCrossRef
18.
go back to reference Eissa, T., Razak, S.A., Ngadi, M.D.A.: Towards providing a new lightweight authentication and encryption scheme for MANET. Wirel. Netw. 17, 833–842 (2011)CrossRef Eissa, T., Razak, S.A., Ngadi, M.D.A.: Towards providing a new lightweight authentication and encryption scheme for MANET. Wirel. Netw. 17, 833–842 (2011)CrossRef
19.
go back to reference John, S.P., Samuel, P.: Self-organized key management with trusted certificate exchange in MANET. Ain Shams Eng. J. 6, 161–170 (2015)CrossRef John, S.P., Samuel, P.: Self-organized key management with trusted certificate exchange in MANET. Ain Shams Eng. J. 6, 161–170 (2015)CrossRef
20.
go back to reference Dabideen, S., Garcia-Luna-Aceves, J.J.: Secure routing in MANETs using local times. Wirel. Netw. 18, 811–826 (2012)CrossRef Dabideen, S., Garcia-Luna-Aceves, J.J.: Secure routing in MANETs using local times. Wirel. Netw. 18, 811–826 (2012)CrossRef
21.
go back to reference Kulkarni, G., Patel, B., Laxkar, P.: Time stamp based cross layer MANET security protocol. In: IEEE 2013 Computational Intelligence and Information Technology Conference, Mumbai, India, pp. 191–199. IEEE (2013) Kulkarni, G., Patel, B., Laxkar, P.: Time stamp based cross layer MANET security protocol. In: IEEE 2013 Computational Intelligence and Information Technology Conference, Mumbai, India, pp. 191–199. IEEE (2013)
22.
go back to reference Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: IEEE 2001 Network Protocols Conference, Riverside, CA, pp. 251–260. IEEE (2001) Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: IEEE 2001 Network Protocols Conference, Riverside, CA, pp. 251–260. IEEE (2001)
23.
go back to reference Jarecki, S., Saxena, N.: On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol. IEEE Trans. Inf. Forensics Secur. 5, 739–749 (2010)CrossRef Jarecki, S., Saxena, N.: On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol. IEEE Trans. Inf. Forensics Secur. 5, 739–749 (2010)CrossRef
24.
go back to reference Singh, Y.K.: A simple, fast and secure cipher. J. Eng. Appl. Sci. 6, 61–69 (2011) Singh, Y.K.: A simple, fast and secure cipher. J. Eng. Appl. Sci. 6, 61–69 (2011)
25.
go back to reference Barr, T.H., Simoson, A.J.: Twisting the keyword length from a Vigenere cipher. Cryptologia 39, 335–341 (2015)CrossRef Barr, T.H., Simoson, A.J.: Twisting the keyword length from a Vigenere cipher. Cryptologia 39, 335–341 (2015)CrossRef
Metadata
Title
A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks
Authors
T. Kavitha
R. Muthaiah
Publication date
12-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1617-6

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner