SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY

Authors

  • D.Sivamurugan PG Student, ECE, K.S.R College of Engineering, Tamilnadu, India
  • L.Raja Associate Professor, ECE, K.S.R College of Engineering, Tamilnadu, India

DOI:

https://doi.org/10.29121/granthaalayah.v5.i4.2017.1798

Keywords:

Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), Network Simulator (Ns-2), Network Simulator (Ns-2)Trust Value (TV)

Abstract [English]

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination


node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.

Downloads

Download data is not yet available.

References

Palanisamy V, Jeneba Mary A, “Hybrid Cryptography By The Implementation Of RSA and AES”; International Journal of Current Research; vol.3, No.4, 2011, 241-244.

Shaikh A P, Kaul V, “Enhanced Security Algorithm using Hybrid Encryption and ECC”; Journal of Computer Engineering; Vol.16, No.3, 2014, 80-85. DOI: https://doi.org/10.9790/0661-16348085

Bing Ji, Liejun Wang, Qinghua Yang, “New Version of AES-ECC Encryption System Based on FPGA in WSNs”; Journal of Software Engineering; Vol.9, No.1, 2015, 87-95.

Xia H, Jia Z, Li X, Ju L, Sha EHM, “Trust prediction and trust-based source routing in mobile ad hoc networks”, Journal of Ad Hoc Networks; Vol.11, 2012, 2096-2114. DOI: https://doi.org/10.1016/j.adhoc.2012.02.009

Wedde HF, Farooq M, Pannenbaecker T, Vogel B, “BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior”; Proceddings of ACM for Generation of Evolutionary Computing Conference, 2005, 153–60. DOI: https://doi.org/10.1145/1068009.1068034

Marjan Kuchaki Rafsanjani, Hamideh Fatemidokht, “FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs”; International Journal of Electricals and communications, 2015, 1-9. DOI: https://doi.org/10.1016/j.aeue.2015.07.013

Singh G, kumar N, Verma A K, “ANTALG: An Innovative ACO based Routing Algorithm for MANETs”, Journal of Networks and Computer Applications, Vol. 45, 2014. DOI: https://doi.org/10.1016/j.jnca.2014.07.006

Sarkar S, Datta R, “A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks”, Journal of Ad Hoc Networks, 2015. DOI: https://doi.org/10.1109/NCC.2014.6811358

Son T T, Minh H L, Sexton G, Aslam N, “A novel encounter-based metrice for mobile ad-hoc networks routing”, Journal of Ad Hoc Networks, Vol.14, 2014. DOI: https://doi.org/10.1016/j.adhoc.2013.10.012

Saif Al-alak, Zuriati A, Azizol A, “AES and ECC Mixed for ZigBee Wireless sensor security”, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, Vol. 5, Issue 9, 2011.

Vanishreeprasad S, Mrs K N Pushpalatha, “Design and Implementation of Hybrid cryptosystem using AES and Hash Function”, Journal of Electronics and Communication Engineering, Vol. 10, Issue 3, 2015.

Kaliappan M, Paramasivan B, “Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling game model”, Journal of Computer and Electrical Engineering, 2015. DOI: https://doi.org/10.1016/j.compeleceng.2014.11.011

Bing J, Liejun W, Qinghua Y, “New Version of AES-ECC Encryption System Based on FPGA in WSNs”, Journal of Software Engineering, Vol. 9, Issue 1, 2015. DOI: https://doi.org/10.3923/jse.2015.87.95

Kim J, Tsudik G, “SRDP: Secure route discovery for dynamic source routing in MANETs”, Journal of Ad Hoc Networks, Vol.7, 2009. DOI: https://doi.org/10.1016/j.adhoc.2008.09.007

Rawya R, Yasmin A, “Two-Phase Hybrid Cryptography for Wireless Sensor Networks”, Journal of Electrical Systems and Information Technology, 2015.

Downloads

Published

2017-04-30

How to Cite

Sivamurugan, D., & Raja, L. (2017). SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY. International Journal of Research -GRANTHAALAYAH, 5(4), 83–91. https://doi.org/10.29121/granthaalayah.v5.i4.2017.1798