Secure Transmission in Ad-hoc Network: Using Combined Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

every time while transferring or broadcasting data to the remote group of wireless ad-hoc network (Mobile ad-hoc node ) problem is occurred. The major challenges that are available in the existing system are, the overcome the problem of more communication required between sender and receiver, second is unavailability of fully trusted key server in cryptography system. The existing cryptography technique is not able to or cannot be deal with this problem. Here we are using new cryptography technique to achieve above goals, which is combination of traditional encryption techniques. Using this technique a members in group maintain public and secret keys. A remote sender can obtain a public key of receivers from key server for encryption and securely broadcast encrypted shared secret key to the intended member in group using combined encryption technique. On receiving, receiver uses its own secret key to decrypt shared secret decryption key

Keywords: wireless ad-hoc network, cryptography, broadcasting, Access control, secure transmission

Edition: Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Share this Article

How to Cite this Article?

Nilesh T Patil, "Secure Transmission in Ad-hoc Network: Using Combined Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14501, Volume 3 Issue 12, December 2014, 1436 - 1439

129 PDF Views | 93 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'wireless ad-hoc network'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1132 - 1138

Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks

K. Anil Kumar, Sumithra R

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 980 - 982

A Survey on Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Kajal B. Kunte, Navnath D. Kale

Share this Article

Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'broadcasting'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3225 - 3227

NCPR: Plummeting Direction-Finding Overhead In MANETs

S. R. Pawar, P. A. Jadhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1398 - 1403

Integrating Multiple Smart Directional Antennas for Full Potential Exploitation of Broadcasting System

R. Kalaiprasath, R. Elankavi, R. Udayakumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3268 - 3272

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Bhagyashri Thakre, Archana Raut

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 571 - 574

Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)

Manjushree T L

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Similar Articles with Keyword 'Access control'

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Similar Articles with Keyword 'secure transmission'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article
Top