Abstract
The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like—unavailable central infrastructure services, periodic movable nodes, wireless link unsteadiness, and possible network separations. In this paper, we present a cryptographic key management scheme for secure communications in ad hoc networks. The scheme transmits the data in the presence of security attacks. The scheme provides the scalability of nodes and storage space wherein the nodes makes use of more than one key pair to encrypt and decrypt the messages. The scheme has been executed in Java programming language and empirically valued its efficiency via performance and security assessments. The simulation outcome has shown that the proposed scheme opposes against selfish nodes and takes less key storage space than traditional schemes. The scheme also satisfies the secure communication requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Kluwer Academic Publishers (2006)
Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education (2006)
Stallings, W.: Cryptography and Network Security: Principles and Practice. 4th edn. Prentice Hall (2005)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
Gandhi, C., Dave, M.: A review of security in mobile ad hoc networks. IETE Tech. Rev. 23(6), 335–344 (2006)
Choi, D., Younho, L.E.E., Yongsu, P.A.R.K., JIN, S.H., Yoon, H.: Efficient and secure self organized public key management for mobile ad hoc networks. IEICE Trans. Commun. E91–B(11), 3574–3583 (2008)
Dahshan, H., Irvine, J.: A Robust Self-Organized Public Key Management for Mobile Ad Hoc Networks. Security Communication Networks, Wiley InterScience, vol. 3, pp. 16–30, (2009)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)
Capkun, S., Hubaux, J., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5(1), 43–51 (2006)
Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad Hoc Networks. Elsevier’s Computers and Security, pp. 199–214 (2009)
He, W., Huang, Y., Ravishankar, S., Nahrstedt, K., Lee, W.C.: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad hoc networks. IEEE Trans. Forensics Secur. 4(1), 140–150 (2009)
Yi-Chun, Hu, Perrig, Adrian: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)
Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: Proceedings of IEEE 6th International Conference on Information, Communications and Signal Processing, pp. 1–5 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Sahadevaiah, K., Ramakrishnaiah, N., Prasad Reddy, P.V.G.D. (2016). An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-30927-9_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30926-2
Online ISBN: 978-3-319-30927-9
eBook Packages: EngineeringEngineering (R0)