CFP last date
20 June 2024
Reseach Article

Enhanced Secure Protocol for Reliable Data Delivery

by T. Srinivasa Rao, Gagandeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 8
Year of Publication: 2015
Authors: T. Srinivasa Rao, Gagandeep Singh
10.5120/20357-2552

T. Srinivasa Rao, Gagandeep Singh . Enhanced Secure Protocol for Reliable Data Delivery. International Journal of Computer Applications. 116, 8 ( April 2015), 22-25. DOI=10.5120/20357-2552

@article{ 10.5120/20357-2552,
author = { T. Srinivasa Rao, Gagandeep Singh },
title = { Enhanced Secure Protocol for Reliable Data Delivery },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 8 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number8/20357-2552/ },
doi = { 10.5120/20357-2552 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:33.278512+05:30
%A T. Srinivasa Rao
%A Gagandeep Singh
%T Enhanced Secure Protocol for Reliable Data Delivery
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 8
%P 22-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We are providing the concept of securing the data in the MANET environment to get the high confidentiality rate while transferring the data in the network. The Enhanced SPREAD is a concept of transforming the data into the network by dividing the secret message into multiple data parts by taking the help of secret sharing algorithms that are presented to provide High security to data by optimal encryption technique. Here we are providing the entire architecture and three major issues that are present in the MANET. First issue is how to get the data parts by using the secret sharing method, Secondly by allocating the data shares onto each path should be in the optimal way so that security can be increased. Coming to the third issue, this depends on the routing protocol and multipath routing techniques in MANET.

References
  1. Wenjing Lou, Wei Liu, Yanchao Zhang, Yuguang Fang, SPREAD: Improving network security by multipath routing in mobile ad hoc networks.
  2. . .
  3. Ankur Lal, Dr. Sipi Dubey, Mr. Bharat Pesswani, Reliability of MANET through the Performance Evaluation of AODV, DSDV, DSR. CSE, CSVTU
  4. .
  5. Shamir, How to Share a Secret, Communications of the ACM. (Nov 1979). Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  6. J. W. Suurballe, Disjoint paths in a network, Networks 4 (1974).
  7. Schneier, Bruce. "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). " Blowfish" Paper. 1993. Web. 18 Mar. 2012.
  8. T. Cormen, C. Leiserson and R. Rivest, Introduction to Algorithms (MIT Press, 1990).
  9. T. -C. Wu and T. -S. Wu, Cheating detection and cheater identification in secret sharing schemes, IEE Proc. Comput. Digit. Tech. 142(5) (September 1995).
  10. W. Lou and Y. Fang, Predictive caching strategy for on-demand routing protocols in ad hoc networks, Wireless Networks 8(6) (Nov 2002).
Index Terms

Computer Science
Information Sciences

Keywords

Routing Network security Ad hoc networks.