M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network
Snehal Javheri, Rahul Kulkarni
DNA cryptography is a new promising direction in cryptography research that emerged with the evolution in DNA computing field. DNA can be used not only to store and transmit the information, but also to perform computation. The extensive parallelism and extraordinary information density inbuilt in this molecule are exploited for cryptographic purposes. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. On the other hand, in Mobile Ad Hoc Networks (MANETs): A Self Organizing and Adaptive Networks, has become one of the most prevalent area of research in the recent year because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate without any physical infrastructure regardless of their geographical location. But, Security solutions are important issues for MANET. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management. Because of these vulnerabilities, MANETs are more prone to malicious attacks. This paper proposes scheme for handling data over untrusted network in air by using DNA Cryptography, which has become a corner stone in MANET security. In this paper, a proposal is given where the concept of DNA based digital encoding is being used in the encryption and decryption process. Unique cipher text generation procedures as well as a new key generation procedure for Wireless Mobile Network are proved to be powerful technique to provide high level of data security. This paper also proposes preventive measures against certain types of attacks that affect the MANET behavior due to any reason. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.
Keywords: Mobile Ad hoc Network MANET, DNA Based cryptography, Key generation, Encryption, Decryption
Edition: Volume 3 Issue 9, September 2014
Pages: 1504 - 1508
How to Cite this Article?
Snehal Javheri, Rahul Kulkarni, "Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015207, Volume 3 Issue 9, September 2014, 1504 - 1508
127 PDF Views | 99 PDF Downloads
Similar Articles with Keyword 'Mobile Ad hoc Network MANET'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1140 - 1143Intrusion-Detection System for MANETs
S. Srihari Reddy, S. Z. Parveen
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2105 - 2111EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks
H. Syed Siddiq, M. Hymavathi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2550 - 2556Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme
Anil Rathod, Sherly Noel
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1504 - 1508Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network
Snehal Javheri, Rahul Kulkarni
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1720 - 1725Performance Improvement in Adaptive Routing Strategy in Mobile Adhoc Network
Samina Anjum, Sapna Khapre
Similar Articles with Keyword 'DNA Based cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 167 - 169A Survey on different DNA Cryptographic Methods
Asha Cherian, Surya R. Raj, Abey Abraham
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1504 - 1508Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network
Snehal Javheri, Rahul Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018
Pages: 1075 - 1078DNA Based Cryptography
Durga Karapurkar, Veena Bhaskaran, Shreya Bale, Preeti Pednekar
Similar Articles with Keyword 'Key generation'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 598 - 602Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment
Deepak G, Dr. Pradeep. B. S, Shreyas Srinath
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 963 - 966Quantum Mechanics and Cryptography
Shiv Kumar, Shrawan Kumar, Bimlendu Verma
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 781 - 785Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1093 - 1096Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation
Madhuri. P, Jayavarthini. C
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'Decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran