Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

Mobile Ad-hoc Network using P-Encryption Scheme

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2015
Authors:
H.O. Archita Deore, Shraddhha Satpute, Pradnya Nandwalkar, K.S. Kumavat
10.5120/ijca2015906506

Archita H O Deore, Shraddhha Satpute, Pradnya Nandwalkar and K S Kumavat. Article: Mobile Ad-hoc Network using P-Encryption Scheme. International Journal of Computer Applications 127(10):17-21, October 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {H.O. Archita Deore and Shraddhha Satpute and Pradnya Nandwalkar and K.S. Kumavat},
	title = {Article: Mobile Ad-hoc Network using P-Encryption Scheme},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {127},
	number = {10},
	pages = {17-21},
	month = {October},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

In this paper, system describe in MANET Energy saving & security in data is an important issue in MANET. This can be solved by network coding which might reduce energy consumption also by using less transmission this system proposed data sharing using data encryption method. Encryption/decryption cost along with transmission time is factor of energy consumption in wireless network. In MANET unreliable wireless media, mobility, lack of infrastructure is a big challenge. Mobile ad hoc network refers to mobility of nodes rather than any fixed infrastructure, act as a mobile router. These mobile routers are responsible for the network mobility in MANET. A Mobile Ad-hoc Network (MANET) is a self configuring network composed of mobile nodes without any fixed wired network. A very important and necessary issue for mobile ad-hoc networks is to find the route between destination and source which is a major technical challenge due to the dynamic topology of the network. To an autonomous group of mobile users that communicate over relatively bandwidth constrained wireless links are refer by mobile ad hoc network. Various algorithms are used for data encryption successfully such as Data Encryption standard (DES), Transposition Substitution Folding Shifting Encryption Algorithm i.e. TSFS, Advance Encryption Standard. TSFS is used for avoiding errors occurring during the decryption process. DES & AES algorithm is used for query execution time & database size. P-coding scheme is used for the mobile ad-hoc network(MANET).

References

  1. Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, and Xuemin (Sherman) Shen, “A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 9, SEPTEMBER 2014
  2. A. Rahim, I. Ahmad, Z. S. Khan, M. Sher, M. Shoaib, A. Javed, R. Mahmood “A Comparative Study of Mobile And Vehicular Ad Hoc Networks,” International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009.
  3. S. Singh, C. Raghavendra, and J. Stepanek, „„Power- Aware broadcasting in Mobile Ad Hoc Networks,‟‟ in Proc. IEEE PIMRC, 1999, pp. 1-10.
  4. J. Wieselthier, G. Nguyen, and A. Ephremides, Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks,‟‟ Mobile Network. Appl., vol. 6, no. 3, pp. 251-263, June 2001.
  5. B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks‟‟ Wireless Network, vol. 8, no. 5, pp. 481.
  6. R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, Network Information Flow,‟‟ IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
  7. J.P. Vilela, L. Lima, and J. Barros, „„Lightweight Security for Network Coding,‟‟ in Proc. IEEE ICC, May 2008, pp. 1750-1754.
  8. Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, Penang “Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET)”.
  9. N.R. Potlapally, S. Ravi,A.Raghunathan, andN.K. Jha, A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols,‟‟ IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
  10. Y. Fan, Y. Jiang, H. Zhu, and X. Shen, „„An Efficient Privacy-Preserving Scheme Against Traffic Analysis in Network Coding,‟‟ in Proc. IEEE INFOCOM, Apr. 2009, pp. 2213-2221.
  11. Pooja Mundhe , Prof. V. S .Khandekar “energy efficient Encryption Scheme for Vehicular Ad-Hoc Network”. Issue 25,March 2015
  12. P.Madhvan, Asst Professor, J.Nandhini, N. Nandhini , Dr P Malathi “Energy Optimization in MANET using Modified P-Coding Scheme” International Journal of Science ,Engineering and Technology Research(IJSETR),volume 3,Issue 4,April 2014

Keywords

MANET, P-coding, encryption, decryption, network coding, data sharing, energy saving.