Novel Encryption Algorithm for Data Protection Mechanism in Wireless Ad- hoc Network  
  Authors : Najim Sheikh; Sagar Tete; Ashish Mohod; Rashmi Ganar

 

Security is one of the most challenging aspects in the internet and network applications. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment, along with other security strategies. We introduce the concept of selective encryption into the design of data protection mechanisms. Utilizing probabilistic methodology and stochastic algorithm, a sender includes proper uncertainty in the process of message encryption, so that only entrusted receiver can decrypt the cipher text and other unauthorized nodes have no knowledge of the transmitted messages on the whole.

 

Published In : IJCAT Journal Volume 1, Issue 10

Date of Publication : 30 November 2014

Pages : 521 - 524

Figures :01

Tables : --

Publication Link :Novel Encryption Algorithm for Data Protection Mechanism in Wireless Ad- hoc Network

 

 

 

Najim Sheikh : M.Tech Scholar 1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur

Sagar Tete : M.Tech Scholar 1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur

Ashish Mohod : M.Tech Scholar 1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur

Rashmi Ganar : M.Tech Scholar 1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur

 

 

 

 

 

 

 

Wireless Security

Selective Cryptographic algorithm

Selective encryption is one of the most promising solutions to reduce the cost of data protection in wireless and mobile networks. In this paper, we have presented a novel solution for selective encryption to achieve data protection effectively while with reasonably costs. They can reduce the overhead spent on data encryption/decryption, and improve the efficiency of the network. The factor of encryption probability involves the uncertainty to data encryption. We evaluate the performance of our approach based on an extensive set of simulation experiments.

 

 

 

 

 

 

 

 

 

[1] Yonglin Ren, Azzedine Boukerche ,Lynda Mokdad, "Performance Analysis of a Selective Encryption Algorithm for Wireless Ad hoc Networks", IEEE WCNC 2011-Network. [2] K.VetriVel, Dr.C.Senthamarai, "A Study of Comparison of various Block Ciphers in Symmetric Key Encryption Algorithm", International Journal of Computer Information Systems, Vol. 1, No. 5, 2010. [3] S.Kala, "Enhanced Selective Encryption Algorithm For Wireless Ad Hoc Networks", International Journal of Computing Technology and Information Security Vol.1, No.2, pp.48-51, December, 2011. [4] M. Abomhara, Omar Zakaria, Othman O. Khalifa, A.A Zaidan, B.B Zaidan, "Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard", International Journal of Computer Theory and Engineering, Vol. 2, No. 2 April, 2010. [5] Yajun Wang, Mian Cai, Feng Tang, "Design of a New Selective Video Encryption Scheme Based on H.264", IEEE International Conference on Computational Intelligence and Security 2007. [6] Bing Qi, Fangyang Shen, “Propagation Models for Multi-hop Wireless Networks in Ns-2 Simulator ", 2011 Eighth IEEE International Conference on Information Technology: New Generations. http://www.isi.edu/nsnam/ns. [7] Stuart Kurkowski, Tracy Camp, Neil Mushell, Michael.