Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

DNA cryptography is a new promising direction in cryptography research that emerged with the evolution in DNA computing field. DNA can be used not only to store and transmit the information, but also to perform computation. The extensive parallelism and extraordinary information density inbuilt in this molecule are exploited for cryptographic purposes. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. On the other hand, in Mobile Ad Hoc Networks (MANETs): A Self Organizing and Adaptive Networks, has become one of the most prevalent area of research in the recent year because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate without any physical infrastructure regardless of their geographical location. But, Security solutions are important issues for MANET. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management. Because of these vulnerabilities, MANETs are more prone to malicious attacks. This paper proposes scheme for handling data over untrusted network in air by using DNA Cryptography, which has become a corner stone in MANET security. In this paper, a proposal is given where the concept of DNA based digital encoding is being used in the encryption and decryption process. Unique cipher text generation procedures as well as a new key generation procedure for Wireless Mobile Network are proved to be powerful technique to provide high level of data security. This paper also proposes preventive measures against certain types of attacks that affect the MANET behavior due to any reason. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.

Keywords: Mobile Ad hoc Network MANET, DNA Based cryptography, Key generation, Encryption, Decryption

Edition: Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Share this Article

How to Cite this Article?

Snehal Javheri, Rahul Kulkarni, "Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015207, Volume 3 Issue 9, September 2014, 1504 - 1508

89 PDF Views | 67 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Ad hoc Network MANET'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1720 - 1725

Performance Improvement in Adaptive Routing Strategy in Mobile Adhoc Network

Samina Anjum, Sapna Khapre

Share this Article

Similar Articles with Keyword 'DNA Based cryptography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1075 - 1078

DNA Based Cryptography

Durga Karapurkar, Veena Bhaskaran, Shreya Bale, Preeti Pednekar

Share this Article

Similar Articles with Keyword 'Key generation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2058 - 2060

Biometric Template Security Scheme using Fuzzy Vault

Purva Gabhane, Anisa Anjum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this Article

Similar Articles with Keyword 'Decryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3182 - 3187

Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation

Punam Hiwase, Sapna Khapre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1448 - 1452

Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

C. Suganya, A. Sangeetha

Share this Article
Top