Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

DNA cryptography is a new promising direction in cryptography research that emerged with the evolution in DNA computing field. DNA can be used not only to store and transmit the information, but also to perform computation. The extensive parallelism and extraordinary information density inbuilt in this molecule are exploited for cryptographic purposes. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. On the other hand, in Mobile Ad Hoc Networks (MANETs): A Self Organizing and Adaptive Networks, has become one of the most prevalent area of research in the recent year because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate without any physical infrastructure regardless of their geographical location. But, Security solutions are important issues for MANET. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management. Because of these vulnerabilities, MANETs are more prone to malicious attacks. This paper proposes scheme for handling data over untrusted network in air by using DNA Cryptography, which has become a corner stone in MANET security. In this paper, a proposal is given where the concept of DNA based digital encoding is being used in the encryption and decryption process. Unique cipher text generation procedures as well as a new key generation procedure for Wireless Mobile Network are proved to be powerful technique to provide high level of data security. This paper also proposes preventive measures against certain types of attacks that affect the MANET behavior due to any reason. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.

Keywords: Mobile Ad hoc Network MANET, DNA Based cryptography, Key generation, Encryption, Decryption

Edition: Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Share this Article

How to Cite this Article?

Snehal Javheri, Rahul Kulkarni, "Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015207, Volume 3 Issue 9, September 2014, 1504 - 1508

127 PDF Views | 99 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Ad hoc Network MANET'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1720 - 1725

Performance Improvement in Adaptive Routing Strategy in Mobile Adhoc Network

Samina Anjum, Sapna Khapre

Share this Article

Similar Articles with Keyword 'DNA Based cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 167 - 169

A Survey on different DNA Cryptographic Methods

Asha Cherian, Surya R. Raj, Abey Abraham

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1075 - 1078

DNA Based Cryptography

Durga Karapurkar, Veena Bhaskaran, Shreya Bale, Preeti Pednekar

Share this Article

Similar Articles with Keyword 'Key generation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1093 - 1096

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'Decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article
Top