Robust authenticated encryption scheme with multiple keys for ad hoc networks

Ajay Kakkar, Maninder Singh

Abstract


Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiveness of the work has been validated by extensive simulations on various combination in terms of S-Boxes, key and data length. The proposed work is a collaboration of optimal selection of S-Boxes, key and data lengths with evaluation of heat dissipation. The work has been carried out to develop an optimized efficient key management technique to reduce the time available for hackers. To verify the effectiveness of proposed algorithm, the results have been compared with K. Xue et al. (2013) , Li et al. (2011) and S. K. Sood et al.’s protocol (2011)

Keywords


Ad hoc network, encryption, keys, hacking time

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v15.i1.pp421-426

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics