Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgment Secure in MANET
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attackers. So, we use an intrusion detection system called Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. Based on the digital signature algorithm (DSA) and RSA the EAACK is designed. To enhance the strength of the security in the mobile adhoc networks, we introduce an innovative approach called Hybrid Security Protocol that provides integrity, confideniality and authentication. This Hybrid Security Protocol consists of Cryptography based on Elliptic curve, Dual-RSA algorithm and Message Digest MD5. Encryption is achieved by using Elliptic Curve Cryptography, Dual-RSA algorithm for authentication and MD-5 for integrity. By using a combination of both symmetric and asymmetric cryptographic techniques, we achieve better security with integrity.
Authors and Affiliations
Ramya K
A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud
Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amo...
Incremental Sequential Pattern Tree Mining
In this paper, we have proposed an Incremental Sequential Pattern Tree mining algorithm to retrieve new updated frequent sequential patterns from dynamic sequence database. Sequential Pattern Tree stores...
A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network
The most prominent applications of wireless sensors networks are coverage, Target detection and field surveillance. This paper investigates detection of a target traversing the region being monitored by some nu...
An Indepth Understanding of eGovernance initiatives: eAuctionA Case Study Approach
Comparative Analysis of Collaborative Filtering Technique
Today it is almost impossible to retrieve information with a keyword search when the information is spread over several pages. The Semantic Web is an extension of the current web in which information is given &nb...