Skip to main content

AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 940))

Abstract

In Mobile Ad hoc Network (MANET), mobile nodes are especially prone to the security threats of eavesdropping, interception, denial-of-service and routing attacks. Some of these problems may be solved with the use of cryptographic protocols. In the recent literature many works make specific proposals on how to use well-known cryptographic techniques to secure MANETs. But these are relies keys for encryption and decryption. For decryption, keys must be shared from source to destination. But secret key sharing in MANET is computationally unsafe and inconsistent due to its dynamic nature. To tackle this problem, this paper proposed an Asymmetric Key Cryptography based on Secret Sharing (AKCSS) Algorithm. This algorithm provides two types of security. One is Secret Sharing, another one is Secure Communication. For Secret Sharing, AKCSS algorithm splits secret key into N shares and transmits each share through different paths from source to destination. For reduce nodes energy consumption, minimum cost routing paths are taken. After receive each share, the destination node can reconstruct secret key. To secure communication, source node encrypts its message with public key which provides cipher text and forwards it via Minimum Cost Routing Path (MCRP). For message transmission from source to destination, MCRP can reduce energy consumption. After receive cipher text, destination node can decrypt using secret key. Experimental results demonstrate that the proposed protocol provides strong security for secret sharing and message transmission. Furthermore, it reduces energy consumption efficiently.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Blackwell, Hoboken (2007)

    Book  Google Scholar 

  2. Jesudoss, A., Subramaniam, N.P.: EAM: architecting efficient authentication model for internet security using image-based one time password technique. Indian J. Sci. Technol. 9(7) (2016). https://doi.org/10.17485/ijst/2016/v9i7/85017

  3. Somassoundaram, T., Subramaniam, N.P.: High capacity image steganography using secret key for medical information. Indian J. Sci. Technol. 9(3) (2016). https://doi.org/10.17485/ijst/2016/v9i3/81455

  4. Zhou, L., Haas, Z.J.: Securing ad hoc networks. Cornell Univ. Secur. Ad Hoc Netw. Presented by Johanna Vartiainen 1(26), 24–30 (1999)

    Google Scholar 

  5. Revathi, V., Pushpalatha, M., Sornalakshmi, K.: Implementation of key exchange and secure routing mechanism in a wireless ad hoc test beds. Indian J. Sci. Technol. 9(10) (2016). https://doi.org/10.17485/IJST/2016/v9i10/75998

  6. Gomathi, K., Parvathavarthini, B.: An enhanced distributed weighted clustering routing protocol for key management. Indian J. Sci. Technol. 8(4) (2015). https://doi.org/10.17485/ijst/2015/v8i4/60435

  7. Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., Sanap, M.: AES algorithm using 512 bit key implementation for secure communication. Int. J. Innov. Res. Comput. Commun. Eng. 2(3), 3516–3522 (2014)

    Google Scholar 

  8. Patil, M.S., Mala, L.M.: Design of high speed 128 bit AES algorithm for data encryption. Int. J. Curr. Eng. Technol. (2013). ISSN 2277–4106, ©2013 INPRESSCO

    Google Scholar 

  9. Rayarikar, R., Upadhyay, S., Pimpale, P.: SMS encryption using AES algorithm on android. IJCA 50(19), 12–17 (2012)

    Article  Google Scholar 

  10. Barker, E., Kelsey, J.: Random Number Generation Using Deterministic Random Bit Generators, NIST Special Publication 800-90A, January 2012

    Google Scholar 

  11. Rani, N.: Suspicious email detection system via triple DES algorithm: cryptography approach. Int. J. Comput. Sci. Mob. Comput. 4(5), 552–565 (2015)

    Google Scholar 

  12. Agrawal, M., Mishra, P.: A modified approach for symmetric key cryptography based on blowfish algorithm. Int. J. Eng. Adv. Technol. 1(6), 79–83 (2012)

    Google Scholar 

  13. Abudin, J., Keot, S.K., Malakar, G., Borah, N.M., Rahman, M.: Modified RSA public key cryptosystem using two key pairs. Int. J. Comput. Sci. Inf. Technol. 5(3), 3548–3550 (2014)

    Google Scholar 

  14. Wang, M.Y., Su, C.P., Horng, C.L., Wu, C.W., Huang, C.T.: Single and multi-core configurable AES architectures for flexible security. IEEE Trans. Very Large Scale Integr. Syst. 18(4), 541–552 (2010)

    Article  Google Scholar 

  15. Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)

    Article  Google Scholar 

  16. Li, D.J., Wang, Y., Chen, H.: The research on key generation in RSA public key cryptosystem, pp. 578–580 (2012)

    Google Scholar 

  17. Chang, D., Gupta, K.C., Nandi, M.: Rc4-hash: a new hash function based on RC4. In: Proceedings of the International Conference on Cryptology, Kolkata, India, 11–13 December 2006

    Google Scholar 

  18. Pirbhulal, S., Zhang, H., Eshrat, M., Alahi, E., Ghayvat, H.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17, 69 (2017). https://doi.org/10.3390/s17010069

    Article  Google Scholar 

  19. Alimohammadi, M., Pouyan, A.A.: Performance analysis of cryptography methods for secure message exchanging in VANET. Int. J. Sci. Eng. Res. 5(2), 912 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Preethi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Preethi, R., Sughasiny, M. (2020). AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_8

Download citation

Publish with us

Policies and ethics