Security is one of the most challenging aspects in
the internet and network applications. Symmetric key
algorithms are a typically efficient and fast cryptosystem, so it
has significant applications in many realms. For a wireless ad
hoc network with constraint computational resources, the
cryptosystem based on symmetric key algorithms is extremely
suitable for such an agile and dynamic environment, along
with other security strategies. We introduce the concept of
selective encryption into the design of data protection
mechanisms. Utilizing probabilistic methodology and
stochastic algorithm, a sender includes proper uncertainty in
the process of message encryption, so that only entrusted
receiver can decrypt the cipher text and other unauthorized
nodes have no knowledge of the transmitted messages on the
whole.
Published In : IJCAT Journal Volume 1, Issue 10
Date of Publication : 30 November 2014
Pages : 521 - 524
Figures :01
Tables : --
Publication Link :Novel Encryption Algorithm for Data Protection
Mechanism in Wireless Ad- hoc Network
Najim Sheikh : M.Tech Scholar
1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur
Sagar Tete : M.Tech Scholar
1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur
Ashish Mohod : M.Tech Scholar
1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur
Rashmi Ganar : M.Tech Scholar
1 RGPV Bhopal, 2, 3, 4 RTMNU Nagpur
Wireless Security
Selective Cryptographic
algorithm
Selective encryption is one of the most promising
solutions to reduce the cost of data protection in wireless
and mobile networks. In this paper, we have presented a
novel solution for selective encryption to achieve data
protection effectively while with reasonably costs. They
can reduce the overhead spent on data
encryption/decryption, and improve the efficiency of the
network. The factor of encryption probability involves
the uncertainty to data encryption. We evaluate the
performance of our approach based on an extensive set
of simulation experiments.
[1] Yonglin Ren, Azzedine Boukerche ,Lynda Mokdad,
"Performance Analysis of a Selective Encryption
Algorithm for Wireless Ad hoc Networks", IEEE
WCNC 2011-Network.
[2] K.VetriVel, Dr.C.Senthamarai, "A Study of
Comparison of various Block Ciphers in Symmetric
Key Encryption Algorithm", International Journal of
Computer Information Systems, Vol. 1, No. 5, 2010.
[3] S.Kala, "Enhanced Selective Encryption Algorithm For
Wireless Ad Hoc Networks", International Journal of
Computing Technology and Information Security
Vol.1, No.2, pp.48-51, December, 2011.
[4] M. Abomhara, Omar Zakaria, Othman O. Khalifa, A.A
Zaidan, B.B Zaidan, "Enhancing Selective Encryption
for H.264/AVC Using Advanced Encryption
Standard", International Journal of Computer Theory
and Engineering, Vol. 2, No. 2 April, 2010.
[5] Yajun Wang, Mian Cai, Feng Tang, "Design of a New
Selective Video Encryption Scheme Based on H.264",
IEEE International Conference on Computational
Intelligence and Security 2007.
[6] Bing Qi, Fangyang Shen, “Propagation Models for
Multi-hop Wireless Networks in Ns-2 Simulator ",
2011 Eighth IEEE International Conference on
Information Technology: New Generations.
http://www.isi.edu/nsnam/ns.
[7] Stuart Kurkowski, Tracy Camp, Neil Mushell, Michael.