Abstract
In Mobile Ad hoc Network (MANET), mobile nodes are especially prone to the security threats of eavesdropping, interception, denial-of-service and routing attacks. Some of these problems may be solved with the use of cryptographic protocols. In the recent literature many works make specific proposals on how to use well-known cryptographic techniques to secure MANETs. But these are relies keys for encryption and decryption. For decryption, keys must be shared from source to destination. But secret key sharing in MANET is computationally unsafe and inconsistent due to its dynamic nature. To tackle this problem, this paper proposed an Asymmetric Key Cryptography based on Secret Sharing (AKCSS) Algorithm. This algorithm provides two types of security. One is Secret Sharing, another one is Secure Communication. For Secret Sharing, AKCSS algorithm splits secret key into N shares and transmits each share through different paths from source to destination. For reduce nodes energy consumption, minimum cost routing paths are taken. After receive each share, the destination node can reconstruct secret key. To secure communication, source node encrypts its message with public key which provides cipher text and forwards it via Minimum Cost Routing Path (MCRP). For message transmission from source to destination, MCRP can reduce energy consumption. After receive cipher text, destination node can decrypt using secret key. Experimental results demonstrate that the proposed protocol provides strong security for secret sharing and message transmission. Furthermore, it reduces energy consumption efficiently.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Blackwell, Hoboken (2007)
Jesudoss, A., Subramaniam, N.P.: EAM: architecting efficient authentication model for internet security using image-based one time password technique. Indian J. Sci. Technol. 9(7) (2016). https://doi.org/10.17485/ijst/2016/v9i7/85017
Somassoundaram, T., Subramaniam, N.P.: High capacity image steganography using secret key for medical information. Indian J. Sci. Technol. 9(3) (2016). https://doi.org/10.17485/ijst/2016/v9i3/81455
Zhou, L., Haas, Z.J.: Securing ad hoc networks. Cornell Univ. Secur. Ad Hoc Netw. Presented by Johanna Vartiainen 1(26), 24–30 (1999)
Revathi, V., Pushpalatha, M., Sornalakshmi, K.: Implementation of key exchange and secure routing mechanism in a wireless ad hoc test beds. Indian J. Sci. Technol. 9(10) (2016). https://doi.org/10.17485/IJST/2016/v9i10/75998
Gomathi, K., Parvathavarthini, B.: An enhanced distributed weighted clustering routing protocol for key management. Indian J. Sci. Technol. 8(4) (2015). https://doi.org/10.17485/ijst/2015/v8i4/60435
Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., Sanap, M.: AES algorithm using 512 bit key implementation for secure communication. Int. J. Innov. Res. Comput. Commun. Eng. 2(3), 3516–3522 (2014)
Patil, M.S., Mala, L.M.: Design of high speed 128 bit AES algorithm for data encryption. Int. J. Curr. Eng. Technol. (2013). ISSN 2277–4106, ©2013 INPRESSCO
Rayarikar, R., Upadhyay, S., Pimpale, P.: SMS encryption using AES algorithm on android. IJCA 50(19), 12–17 (2012)
Barker, E., Kelsey, J.: Random Number Generation Using Deterministic Random Bit Generators, NIST Special Publication 800-90A, January 2012
Rani, N.: Suspicious email detection system via triple DES algorithm: cryptography approach. Int. J. Comput. Sci. Mob. Comput. 4(5), 552–565 (2015)
Agrawal, M., Mishra, P.: A modified approach for symmetric key cryptography based on blowfish algorithm. Int. J. Eng. Adv. Technol. 1(6), 79–83 (2012)
Abudin, J., Keot, S.K., Malakar, G., Borah, N.M., Rahman, M.: Modified RSA public key cryptosystem using two key pairs. Int. J. Comput. Sci. Inf. Technol. 5(3), 3548–3550 (2014)
Wang, M.Y., Su, C.P., Horng, C.L., Wu, C.W., Huang, C.T.: Single and multi-core configurable AES architectures for flexible security. IEEE Trans. Very Large Scale Integr. Syst. 18(4), 541–552 (2010)
Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)
Li, D.J., Wang, Y., Chen, H.: The research on key generation in RSA public key cryptosystem, pp. 578–580 (2012)
Chang, D., Gupta, K.C., Nandi, M.: Rc4-hash: a new hash function based on RC4. In: Proceedings of the International Conference on Cryptology, Kolkata, India, 11–13 December 2006
Pirbhulal, S., Zhang, H., Eshrat, M., Alahi, E., Ghayvat, H.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17, 69 (2017). https://doi.org/10.3390/s17010069
Alimohammadi, M., Pouyan, A.A.: Performance analysis of cryptography methods for secure message exchanging in VANET. Int. J. Sci. Eng. Res. 5(2), 912 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Preethi, R., Sughasiny, M. (2020). AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-16657-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16656-4
Online ISBN: 978-3-030-16657-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)