Documente Academic
Documente Profesional
Documente Cultură
Abstract:- In this paper explain ad hoc and II. Mobile Ad Hoc Network
security mechanism.ad hoc network is a
collection of various mobile nodes that An ad-hoc network is a collection of various
dynamically form a network and are used for wireless mobile hosts Mobile Ad-hoc
communicating with each other without the networks are self-configuring as well as self-
any network infrastructure or any centralized organizing multi-hop wireless networks.
node. The main focus of this work is to secure Nodes communicating to physical media; they
the data transmission in mobile ad hoc transmit and get signals [7]. If the destination
network and this is possible by using hybrid node is not inside range of the source node,
approach. This hybrid approach is a the source node help to intermediate nodes in
combination of MD5 & RSA encryption order to communicate with the other node.
algorithms which helps to protect data from Fig1 represent the Mobile ad-hoc network.
the various attacks in the MANETs network. In The node transmit a message to another node
this work, a 16-bit key is used which made it that is out of range, the cooperation of other
more secure. No one can decrypt the nodes in the network is required; it is
encrypted data without this 16-bit key. represented by multi-hop communication.
Therefore, each node at the same time must
Keyword:- Ad-Hoc network, MANETs, decrypt act both as a host as well as router.
I. Introduction:
www.sciencepublication.org
48
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue 2 (June 2014)
Related Work:- The figure should make this process a bit more
1) DES clear
2) PGP
PGP:-PGP algorithm the key pair is generated.
One key of the pair is the Private key which
V. Introduction DES
should always be kept safe and never given to
anyone. The other key is the public key which
DES developed by IBM company. The US should be given to as many people as possible.
National Security Agency (NSA) create several
modifications, after which it was developed as
VI. Some Important PGP terms
Federal Information Processing Standard (FIPS)
standard 46-3 and ANSI standard X3.92.
1) Key:-PGP key is a key pair, private key
and a public key. The term PGP key
Working DES:-Encryption message takes refers to the public key.
place in 16 stages. With the help of input key,
sixteen 48 bit keys are created, one for every 2) UID (User Identity):- it is defined by the
round. In case of every round, these round public key it is big number
called S-boxes are used in DES. These S-
boxes are fixed in the specification of the 3) Signature:- the term signature refers to
standard [9]. Recently it has been discovered something youve used for the privacy.
that these S-boxes, against an attack called [10].
differential cryptanalysis. The message is 4) Certificate:- certificate are used for the
authentication or signed by the sender.
divided into two parts. The right half is
And verified by the receiver.
expanded from 32 to 48 bits using table. The
result is added with the sub key for that round
using the XOR operation [6]. Using the boxes
the 48 resulting bits are then change again to The solution includes PGP & DES to represent
32 bits, the shuffled right half is now the cipher encoded text of the original data.
combined with the left half used by the XOR One key is used to protect data. key is of 16-
operation. In the further round, this bit key. When user want to check the data then
combination is used as the new left half. there is a need of one key & other is cipher
encoded text which encrypted with the PGP
Encryption & DES Encryption. Both work
simultaneously. Figure 4.1 shows the key &
cipher encoded text generated by PGP & DES
Encryption.
www.sciencepublication.org
51
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue 2 (June 2014)
IX. Result:-
Fig. 10 Cluster
Fig. 11 Cluster
www.sciencepublication.org
52
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue 2 (June 2014)
X. Conclusion
Reference:-
[1] Network Centric Warfare, Department of
Defense, Washington, DC, Jul. 2001, report to
Congress.
[2] Global Information Grid Architectural
Vision, Department of Defense, Washington,
DC, Jun. 2007.
[3] Renu Dalal, Yudhvir Singh and Manju
Fig. 13 Cluster Khar, A Review on Key Management
Schemes in MANET International Journal of
Figure 10, 11, 12 and 13 shows the various Distributed and Parallel Systems (IJDPS)
scenario of MANET with nodes cluster and Vol.3, No.4, July 2012.
its working. [4] Panagiotis Papadimitratos ,Zygmunt J.
Haas., Secure message transmission in
mobile ad hoc networks.
www.sciencepublication.org
53
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
Vol 2 Issue 2 (June 2014)
www.sciencepublication.org
54