Skip to main content

Selective Encryption Algorithm Based on Natural Language Processing for Text Data in Mobile Ad hoc Network

  • Conference paper
  • First Online:
Innovations in Electronics and Communication Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 7))

Abstract

In today’s era, security is extremely recommended for data which is send over network. The research problem states that although various approaches toward security are proposed day by day, the security loop holes are also propagating and thus constant innovation is essential toward protection of data. The primary objective of this paper was to introduce a selective significant data encryption method (SSDE). The SSDE provides sufficient uncertainty to the data encryption process as it selects only significant data out of the whole message using natural language processing (NLP). This in turn reduces the encryption time and enhances the performance. The research work shows that proposed work is superior to the existing work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boukerche A, Mokdad L, Ren Y (2011) Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: IEEE, pp 1038–1043

    Google Scholar 

  2. Matin MA, Hossain MM, Islam MF, Islam MN, Hossain MM (2009) Performance evaluation of symmetric encryption algorithm in MANET and WLAN. In: International conference for technical postgraduates (TECHPOS), Kuala Lumpur, 14–15 Dec

    Google Scholar 

  3. Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. In: 6th International forum on strategic technology

    Google Scholar 

  4. Umaparvathi M, Varughese DK (2010) Evaluation of symmetric encryption algorithms for MANETs. In: International conference on computational intelligence and computing research (ICCIC), pp 1–3, IEEE

    Google Scholar 

  5. Roy M, Pradhan C (2011) Secured selective encryption algorithm for MPEG-2 video. Int Conf Electron Comput Technol (ICECT) 2:420–423

    Google Scholar 

  6. Shen H, Zhuo L, Zhao Y (2014) An efficient motion reference structure based selective encryption algorithm for H264 videos. Inf Secur, IET 8(3):199–206

    Article  Google Scholar 

  7. Xu P, Zhao J, Wang D (2011) A selective image encryption algorithm based on hyper-chaos. In: 3rd international conference on communication software and networks (ICCSN), pp 376–379, IEEE

    Google Scholar 

  8. Massoudi A, Lefebvre F, De Vleeschouwer C (2008) Overview on selective encryption of image and video: challenges and perspectives. In: 10th IEEE international symposium on multimedia, pp 31–38

    Google Scholar 

  9. Steven B, Loper E, Klein E (2009) Natural language processing with python. O’Reilly Media Inc, Sebastopol

    MATH  Google Scholar 

  10. Ajay K, Sharma HR (2014) Designing an enhanced selective encryption method for securing mobile adhoc network. In: International conference on computational intelligence and communication networks (CICN), IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay Kushwaha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kushwaha, A., Sharma, H.R., Ambhaikar, A. (2018). Selective Encryption Algorithm Based on Natural Language Processing for Text Data in Mobile Ad hoc Network. In: Saini, H., Singh, R., Reddy, K. (eds) Innovations in Electronics and Communication Engineering . Lecture Notes in Networks and Systems, vol 7. Springer, Singapore. https://doi.org/10.1007/978-981-10-3812-9_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3812-9_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3811-2

  • Online ISBN: 978-981-10-3812-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics