Safe and Secure Data Transfer in Mobile AD-HOC Networks using Multilevel Encryption Techniques

Authors

  • Mr. P. Daniel Sundarraj  Department of Computer Science and Application, K.M.G. College of Arts and Science, Gudiyattam,Tamil Nadu, India
  • Dr. K. Arulanandam  Department of Computer Application, Government Thirumagal Mills College, Gudiyattam,Tamil Nadu, India

Keywords:

Ad-hoc Network, Encryption, Decryption, Routing, Multi Hopping, Cryptography, Cipher Text

Abstract

At the time of sending any secret information from a source node to a destination node over a wireless network, it is very critical to transmit it in a safe and secure manner. A set of wireless nodes constructs an Ad Hoc network and this network does not have any central control or centralized administration. In self-mode, wireless Ad-hoc networks are organized and configured. All nodes in this network are set up by using a wireless transmitter and a wireless receiver. The wireless Ad Hoc network transmits data with other nodes within its communication range only. Using a common physical media, the data are transmitted between one node and another node in this network. Every node sends and receives signals using the same frequency band and it follows the same hopping method during data transmission. If the destination node is not inside the transmission range, the source node will use the other nodes to transmit the messages hop by hop. In order to send a message from one node to another node that is out of its frequency range, it needs the help of other nodes in the network for the data transfer. This technique is technically known as multi-hop communication. In this network, each and every node acts both as a host and as a router at the same time. Wireless Mobile Ad Hoc networks are usually attacked the sources such as intruders, hackers and other physical attacks. Constructing and configuring the safest and secure wireless ad-hoc network is very difficult for the reasons such as: the poor quality of communication paths and communication nodes, low quality infrastructure, frequently updating topologies and technologies. Due to these main factors, the wireless communication path or channel can be easily accessed by all the network users and the attackers and it makes the network operations very insecure and unsafe. Any user can easily break the network system and its operations by not following any specific protocol. Hence, a safe and secure protocol or an algorithm is to be developed for the safest data transfer. Also, there is another issue and it is the complexity of finding the routing mechanism to transfer our data from one node to another node in a safe way. In this paper, we are suggesting a multi-level encryption technique which can send the data over a wireless network in a safe and secure way.

References

  1. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and KashyapBalakrishnan, Member, IEEE
  2. L. Buttyan and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, 2003.
  3. K. Balakrishnan is with the Security Services Group, Deloitte and Touche LLP, 1750 Tysons Boulevard, Suite 800, McLean, VA 22102. E-mail: [email protected].
  4. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, Aug. 2000.
  5. V.-N. Padmanabhan and D.-R. Simon, “Secure Traceroute to Detect Faulty or Malicious Routing,” SIGCOMM Computer Comm. Rev., vol. 33, no. 1, Jan. 2003.
  6. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, “Cooperation in Wireless Ad Hoc Networks,” Proc. INFOCOM, Mar.-Apr. 2003.
  7. D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva, “The Dynamic Source Routing Protocolfor Mobile Ad Hoc Networks (DSR),” Internet draft, Feb. 2002.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
Mr. P. Daniel Sundarraj, Dr. K. Arulanandam, " Safe and Secure Data Transfer in Mobile AD-HOC Networks using Multilevel Encryption Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.30-34, January-February-2018.