International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

every time while transferring or broadcasting data to the remote group of wireless ad-hoc network (Mobile ad-hoc node) problem is occurred. The major challenges that are available in the existing system are, the overcome the problem of more communication required between sender and receiver, second is unavailability of fully trusted key server in cryptography system. The existing cryptography technique is not able to or cannot be deal with this problem. Here we are using new cryptography technique to achieve above goals, which is combination of traditional encryption techniques. Using this technique a members in group maintain public and secret keys. A remote sender can obtain a public key of receivers from key server for encryption and securely broadcast encrypted shared secret key to the intended member in group using combined encryption technique. On receiving, receiver uses its own secret key to decrypt shared secret decryption key

Keywords: wireless ad-hoc network, cryptography, broadcasting, Access control, secure transmission

Edition: Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Share this Article

How to Cite this Article?

Nilesh T Patil, "Secure Transmission in Ad-hoc Network: Using Combined Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14501, Volume 3 Issue 12, December 2014, 1436 - 1439

Enter Your Email Address


Similar Articles with Keyword 'wireless adhoc network'

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2103 - 2108

Secure Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Kajal Kunte, Navnath Kale

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1158 - 1164

An Optimal Path Determination of Moving Beacons Using Localized Directional Routing Protocol in Mobile Adhoc Network

Kajal K.Kapoor, R. S. Mangrulkar

Share this Article

Similar Articles with Keyword 'cryptography'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 11 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'broadcasting'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3225 - 3227

NCPR: Plummeting Direction-Finding Overhead In MANETs

S. R. Pawar, P. A. Jadhav

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 571 - 574

Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)

Manjushree T L

Share this Article

Similar Articles with Keyword 'Access control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'secure transmission'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Similar Articles with Keyword 'wireless'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'adhoc'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 97

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Similar Articles with Keyword 'network'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article
Top