CFP last date
20 May 2024
Reseach Article

A CRT based encryption methodology for secure communication in MANET

by Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 16
Year of Publication: 2012
Authors: Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki
10.5120/4904-7406

Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki . A CRT based encryption methodology for secure communication in MANET. International Journal of Computer Applications. 39, 16 ( February 2012), 20-25. DOI=10.5120/4904-7406

@article{ 10.5120/4904-7406,
author = { Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki },
title = { A CRT based encryption methodology for secure communication in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 16 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number16/4904-7406/ },
doi = { 10.5120/4904-7406 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:36.064811+05:30
%A Ditipriya Sinha
%A Uma Bhattacharya
%A Rituparna Chaki
%T A CRT based encryption methodology for secure communication in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 16
%P 20-25
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs are well known for their flexibility and ease of communication. The communication is purely based on trust, without any need of authentication. This often leads to insecure communication, causing information tampering. The traditional means of security are not sufficient to safeguard against the inherent dangers of MANET. Researchers around the world are working in this issue. The preferred mode of securing data is through encryption. The process of encryption however is complex enough to increase the computational overhead. This paper proposes a secure encryption strategy using Chinese Remainder Theorem for shielding data from unauthorized access. The paper also includes a comparison of proposed method with existing methods

References
  1. Y.C.Hu, A Perrig, “A survey of Security Wireless AdHoc Routing”,IEEE Security and Privacy ,vol-2,2004.
  2. A.Shamir, “How to share a secret? ”, Comm.ACM, vol.22, No-11, 1979.
  3. Tom.M.Apostol, “Introduction To Number Theory”, Springer-verlag, 1976.
  4. S.Sarkar,B.Kisku,S.Misra and M.S Obaidat “ Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET using Verifiable Secret Sharing Scheme” IEEE International Conference On Wireless and Mobile Computing,Networking and Communications,2009.
  5. A.Amuthan and B.Arvind Baradwaj “Secure Routing Scheme in MANETs using Secret Key Sharing”, International Journal of Computer Applications(00975-8887) volume 22-No.1,May 2011.
  6. Ravi K.Balachandan,Xukai Zou,Bytrav Ramamurthy,Amardeep Thukral “An efficient and attack resistant agreement scheme for secure group communications in mobile ad-hoc networks”,Wireless Communication And Mobile Computing in Willey Interscience,2007.
  7. CK.Kaya and A.A.Seluck, “A Verfiable Secret Sharing Scheme Based On the Chinese Remainder Theorem”, INDOCRYPT 2008,LNCS 5365.
  8. Do-hyoen Lee,Sun Choi,Ji-hyoen Choi and Jae-il Jung “Location Aided Secure Routing Scheme in Mobile AdHoc Networks”,Springer-Verlag Berlin Heidelberg 2007.
  9. P.Feldman “A practical scheme for non interactive verifiable secret sharing”,IEEE Symposium On Foundation of Computer Science.
  10. Pankaj Kumar Sehgal,Rajdeep Nath “A Encryption Based Dynamic and Secure Routing Protocol for Mobile Adhoc Network”,International Journal of Computer Science and Security(IJCSS),volume 3-No.1.2009.
  11. A.S Purnima,B.B Amberkar,” Key Management Scheme For Secure Communication In Hetarogenious Sensor Network” Techniques for MANETs”,International Journal of Recent Trends In Engineering ,volume.1,No-1,May 2009.
  12. P.Papadimitoras and Z Hass, “Secure Data Transmission in Mobile Adhoc Networks”,ACM workshop on Wireless Security,Proc of 2003.
  13. Celia Li, Zhuang Wang and Cungang Yang,”Secure Routing for Wireless Mesh Network”,International Journal of Network Security,volume.33,No-2,sept 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Chinese Remainder Theorem Safety Key Super Key Lagrange’s Interpolation