scholarly journals A new hybrid text encryption approach over mobile ad hoc network

Author(s):  
Mohammed Amin Almaiah ◽  
Ziad Dawahdeh ◽  
Omar Almomani ◽  
Adeeb Alsaaidah ◽  
Ahmad Al-Khasawneh ◽  
...  

Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.

2007 ◽  
Vol 18 (05) ◽  
pp. 987-1004 ◽  
Author(s):  
ZHENCHUAN CHAI ◽  
ZHENFU CAO ◽  
XIAOLEI DONG

Threshold decryption allows a message encrypted under a public key to be read only when a quorum of users cooperate to decrypt the ciphertext. However, such threshold decryption scheme does not apply well in the situation where all the users have their own public/private key pairs, but not share any private key associated with a public key, such as mobile ad hoc network featured by its dynamic character. An immediate way to achieve threshold decryption in this situation is to split the message into pieces, then encrypt these pieces under the public keys of different users. However, it is not efficient. In this paper, we propose an efficient identity based multi-receiver threshold decryption scheme that could be applied efficiently in the above situation. We also define the security notions and prove the security in random oracle model. At last, we add the broadcast feature to the scheme, such that a message could be broadcast to any number of groups.


Author(s):  
Shadi R. Masadeh ◽  
Walid K. Salameh

This chapter presents a keyless self-encrypting/decrypting system to be used in various communications systems. In the world of vast communications systems, data flow through various kinds of media, including free air. Thus the information transmitted is free to anyone who can peer it, which means that there should be a guarding mechanism so the information is transmitted securely over the medium from the sender to the intended receiver, who is supposed to get it in the first place and deter the others from getting the information sent. Many encryption systems have been devised for this purpose, but most of them are built around Public Key Infrastructure (PKI) wherein public key cryptography, a public and private key, is created simultaneously using the same algorithm (a popular one is known as RSA) by a certificate authority (CA). The private key is given only to the requesting party, and the public key is made publicly available (as part of a digital certificate) in a directory that all parties can access. The private key is never shared with anyone or sent across the medium. All of the commonly used encryption systems exchange keys that need to be generated using complex mathematical operations that take noticeable time, which is sometimes done once, and exchanged openly over unsecured medium. We are proposing an expandable keyless self-encrypting/decrypting system, which does not require the use of keys in order o minimize the chances of breaching data exchange security and enhance the data security of everyday communications devices that are otherwise insecured.


This research paper proposes the “mobile ad hoc networks (MANETs) need aid autonomously self-organized networks without framework backing”. For a “mobile ad hoc network, nodes move arbitrarily”; consequently that network might background fast also random topology changes.In view nodes previously, a MANET regularly have set transmission ranges, a percentage node can't correspond specifically with one another. Hence, routing path in mobile networks possibly hold numerous hops, each hub to mobile networks need the obligation on go about as a switch. This paper is an review from research work on “routing protocol for MANET, Mobile Ad Hoc Network” has as of late increased a ton of fame among computer researchers and specialists. “A MANET is an infrastructure less network” with a lot of dynamic, versatile and self-arranging hubs. Intrigue and utilization of remote versatile network have been becoming in the course of the most recent couple of years.MANETs to have a productive multicast directing and a Quality of Service (QoS) component.Multicast for Ad hoc Network with Hybrid Swarm Intelligence convention depends on swarm insight based optimization technique.


2020 ◽  
Vol 8 (5) ◽  
pp. 5526-5532

Key exchange protocols play a vital role in symmetric key cryptography. The transfer of private key through the secured medium is a challenging task because every day the intruders are evolved and the attacks are increasing constantly. The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols. That challenges demanding new protocol or methodology of transferring secret key between the parties. The paper proposes a new, secured, less computational overhead key exchange mechanism using short message service available in the cellular networks. GSM-SMS is a highly established secured channel and the research uses this facility to transfer the key between senders to a receiver of the symmetric key cryptosystem. The private key no need to reveal to third parties or even the receiver because the sender can directly communicate to the decryption system through the mobile SMS. After the decryption process, the secret key will be destroyed immediately. There is no possible attack during the key transfer and loss and error of the communication are very less.


Author(s):  
K. Vinayakan ◽  
M. V. Srinath

There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.


2019 ◽  
Vol 32 (3) ◽  
pp. 463-478
Author(s):  
Folayo Aina ◽  
Sufian Yousef ◽  
Opeyemi Osanaiye

The widespread of wireless mobile network have increased the demand for its applications. Providing a reliable QoS in wireless medium, especially mobile ad-hoc network (MANET), is quite challenging and remains an ongoing research trend. One of the key issues of MANET is its inability to accurately predict the needed and available resources to avoid interference with already transmitting traffic flow. In this work, we propose a resource allocation and admission control (RAAC) solution. RAAC is an admission control scheme that estimates the available bandwidth needed within a network, using a robust and accurate resource estimation technique. Simulation results obtained show that our proposed scheme for MANET can efficiently estimate the available bandwidth and outperforms other existing approaches for admission control with bandwidth estimation.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


Mobile Ad hoc network (MANETs) is a selforganizing multi-hop wireless network with dynamic topologies. Due to the absence of Control Authority in MANET, the network seems to be vulnerable that can be easily destroyed by the entry of malicious nodes. The presence of malicious nodes can destroy the data transmission of the network. So, finding and removing the malicious nodes is one of the critical issues in the MANET. With the help of the proposed Coherence Key Based Node Authentication for Routing (CKR) Algorithm, each and every mobile node are authenticated while updating the routing table by using the authentication key value that is generated with the help of random number with the secret key. Only the authenticated nodes (non-Malicious Nodes) are updated in the routing table and the remaining nodes which are not authenticated (malicious nodes) will be eliminated from the routing table. So that, the malicious node will not participated and could not destroy the data transmission. Thus, it makes this Multi-hop network as more trustful network.


2020 ◽  
pp. 1199-1225
Author(s):  
Anwesha Mukherjee ◽  
Priti Deb ◽  
Debashis De

Nature inspired computing has been widely used to solve various research challenges of mobile network. Mobile network refers to mobile network, sensor network and ad hoc network. This chapter has focused on the application of nature inspired computing in mobile network. In this chapter, the bio-inspired techniques for wireless sensor network, mobile ad hoc network and mobile cloud computing are discussed. Ant colony optimization is used in sensor network and mobile cloud computing for efficient routing and scheduling respectively. Bee swarm intelligence is used to develop routing schemes for mobile ad hoc network. Bird flocking behavior is used for congestion control in wireless sensor network. The research challenges of bio-inspired mobile network are also illustrated.


Author(s):  
Valery Hladkykh ◽  
Oleg Toroshanko

Ad Hoc sensor network with mobile network nodes is considered. The basic parameters of the bandwidth and quality of the data exchange channel constructed on the sensor network are analyzed. Statistical analysis of network service quality uses a parameter based on Mean Opinion Score (MOS). This parameter takes into account characteristics such as jitter, delay time, and packet loss rate, and allows you to quantify call quality for calls in the range of 1.0 to 5.0. At the stage of designing the sensor network and in the process of its development, the task of choosing a routing algorithm is very important. To solve the problem of optimal routing in the sensor network a partial mathematical model of the network, consisting of N switching nodes and M lines of wireless communication, has been developed. The average time for messages to remain in the line between two network nodes is determined. To improve methods and algorithms for routing in sensory networks, a generalized mathematical model of the routing process in complex networks and methodology has been developed to select the best route or a set of best routes by a set of criteria.For the most complete comparative evaluation of the effectiveness of a route, it is advisable to consider the route metric ‒ the generalized distance selected for the selected service class and the administrative distance ‒ the route parameter by which the degree of confidence in information received from neighboring devices is determined. It is shown that for optimal organization of data flows in a heterogeneous network it is advisable to use routing algorithms with many quality criteria. To do this, you must conduct an ongoing analysis of the characteristics of the network segments and automatically modify the routing tables. The basis of quality functionality is the route metric. In order to increase the reliability of the data on the state of the route, a quantitative (functional) measure of the administrative distance was introduced into the mathematical model. As a tool for evaluating and managing criteria by their relative importance, it is proposed to use the method of analysis of the Saati hierarchy.


Sign in / Sign up

Export Citation Format

Share Document