Snehal Javheri, Rahul Kulkarni
Abstract: DNA cryptography is a new promising direction in cryptography research that emerged with the evolution in DNA computing field. DNA can be used not only to store and transmit the information, but also to perform computation. The extensive parallelism and extraordinary information density inbuilt in this molecule are exploited for cryptographic purposes. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. On the other hand, in Mobile Ad Hoc Networks (MANETs): A Self Organizing and Adaptive Networks, has become one of the most prevalent area of research in the recent year because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate without any physical infrastructure regardless of their geographical location. But, Security solutions are important issues for MANET. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management. Because of these vulnerabilities, MANETs are more prone to malicious attacks. This paper proposes scheme for handling data over untrusted network in air by using DNA Cryptography, which has become a corner stone in MANET security. In this paper, a proposal is given where the concept of DNA based digital encoding is being used in the encryption and decryption process. Unique cipher text generation procedures as well as a new key generation procedure for Wireless Mobile Network are proved to be powerful technique to provide high level of data security. This paper also proposes preventive measures against certain types of attacks that affect the MANET behavior due to any reason. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.
Keywords: Mobile Ad hoc Network MANET, DNA Based cryptography, Key generation, Encryption, Decryption