Security in Manets using Cryptography Algorithms

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

SECURITY IN MANETS USING CRYPTOGRAPHY ALGORITHMS N Neelima1, Lekharaju Sai Siddhartha2, Chavali Meghana3, Shaik Sameer4, Shaik Ashika5, Vemulamada Naga Chandramouli6 1 Assistant

Professor, 2,3,4,5,6 Final year B. Tech, Department of Information Technology, VRSEC, Vijayawada, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Mobile Ad-hoc Network (MANET) is an

1.1 Goals of Cryptography

important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets intentionally and disturb the process of the routing protocol. To solve this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Security to the routing protocol is incorporated using traditional SHA algorithm along with symmetric and asymmetric key encryption methods. The performance of the proposed algorithms is analyzed with different algorithms and results are shown improvement in terms of the time taken to transfer the data, communication overheads and battery consumption.

1. INTRODUCTION Now-a-days the mobile devices are used more frequently as every person owns at least a mobile device. We use these devices for almost everything like to share data, post an update, and share the information. In such cases these devices must be secured. Cryptography will be playing a major role in hiding the data or information. These cryptography algorithms are divided into two types, symmetric key cryptography algorithms and asymmetric key cryptography algorithms. The symmetric algorithms will use same key for encryption and decryptions of the information. These are again divided into Block ciphers and stream ciphers. Block ciphers will use block of data for the encryption and decryption like AES, DES and Blowfish. Stream ciphers use single bit at a time like in RC4. In asymmetric key algorithms, there will be two different keys used for the encryption and decryption, one is public key and another is private key. We can use one key for encryption and other for decryption like RSA algorithm. Public key is public to all but private key is recognized for the user only. Due to large processing of the keys the asymmetric algorithms are much slower than the symmetric key algorithms.

Impact Factor value: 5.181

1.1.2

Data Integrity: This is to ensure that the data is not changed intentionally or accidentally.

1.1.3

Authentication: Authentication is to ensure that the originator is original and is known to receiver.

1.1.4

Non-Repudiation: Non-Repudiation is to assure that the sender cannot refuse the fact that he send the message or vice versa.

In asymmetric key algorithm two different keys are used, one public key and another private key. Generally, the public key is used for the encryption process and the private key is used for the decryption process because this will make only the receiver to decrypt the message. So, the sender encrypts the message with the help of the public key of the receiver and sends the message, now the receiver will be able to decrypt the message using his own private key.

cryptographic algorithm, Asymmetric key cryptographic algorithm, SHA, RSA, AES.

|

Confidentiality: Confidentiality is basically used to ensure that the data is safe and private this is obtained using encryption.

1.2 Asymmetric Key Algorithm

Key Words: MANETS, Security, Symmetric key

Š 2017, IRJET

1.1.1

1.3 Symmetric key Algorithm In symmetric key algorithm, we will use only one single key for both encryption and decryption. The sender will encrypt the message with a secret key that is shared between the sender and the receiver privately. This key will be used by the receiver to decrypt the cipher text from the sender. Thus in this algorithms one secret key is used. 1.4 Cryptographic hash functions The cryptographic hash functions are the functions that take an input and return a fixed-size alphanumeric string. The string is called the hash value or message digest or digital fingerprint or digest or checksum. The ideal hash function has three main properties: (a) It is extremely easy to calculate a hash for any given data. (b) It is extremely computationally difficult to calculate an alphanumeric text that has a given hash. (c)It is extremely

|

ISO 9001:2008 Certified Journal

|

Page 2012


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.