Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
every time while transferring or broadcasting data to the remote group of wireless ad-hoc network (Mobile ad-hoc node ) problem is occurred. The major challenges that are available in the existing system are, the overcome the problem of more communication required between sender and receiver, second is unavailability of fully trusted key server in cryptography system. The existing cryptography technique is not able to or cannot be deal with this problem. Here we are using new cryptography technique to achieve above goals, which is combination of traditional encryption techniques. Using this technique a members in group maintain public and secret keys. A remote sender can obtain a public key of receivers from key server for encryption and securely broadcast encrypted shared secret key to the intended member in group using combined encryption technique. On receiving, receiver uses its own secret key to decrypt shared secret decryption key
Keywords: wireless ad-hoc network, cryptography, broadcasting, Access control, secure transmission
Edition: Volume 3 Issue 12, December 2014
Pages: 1436 - 1439
How to Cite this Article?
Nilesh T Patil, "Secure Transmission in Ad-hoc Network: Using Combined Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14501, Volume 3 Issue 12, December 2014, 1436 - 1439
129 PDF Views | 93 PDF Downloads
Similar Articles with Keyword 'wireless ad-hoc network'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana, Sandeep Gupta
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1132 - 1138Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks
K. Anil Kumar, Sumithra R
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 980 - 982A Survey on Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR
Kajal B. Kunte, Navnath D. Kale
Similar Articles with Keyword 'cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Similar Articles with Keyword 'broadcasting'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3225 - 3227NCPR: Plummeting Direction-Finding Overhead In MANETs
S. R. Pawar, P. A. Jadhav
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1398 - 1403Integrating Multiple Smart Directional Antennas for Full Potential Exploitation of Broadcasting System
R. Kalaiprasath, R. Elankavi, R. Udayakumar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3268 - 3272A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
Bhagyashri Thakre, Archana Raut
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020
Pages: 571 - 574Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)
Manjushree T L
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 781 - 785Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao
Similar Articles with Keyword 'Access control'
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Similar Articles with Keyword 'secure transmission'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2075 - 2077Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN
Rekha V. Aher, Sunita Nandagave
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2269 - 2272Detecting Malicious Nodes for Secure Route Discovery in MANETs
Zalte S. S., Dr. Ghorpade V. R.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1122 - 1125Improving Security of Traceable White-Box CPABE with TTP Access Control
Dilu Anil