alexa Secure Data Transmission in MANETS Using ELIPTIC Curve
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Secure Data Transmission in MANETS Using ELIPTIC Curve Cryptography

K.Sangeetha
M.E Computer and communication Engg, Department of I.T, SNS College of Technology, Coimbatore, Tamilnadu, India
Related article at Pubmed, Scholar Google
 

Abstract

MANET is a collection of wireless mobile nodes forming a network without using any existing infrastructure. There are various challenges that are faced in the Adhoc environment. These are mostly due to the lack of resources of these networks. The solutions for conventional networks are usually not sufficient to provide efficient Adhoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. Enhanced Adaptive Acknowledge (EAACK) one of the Intrusion Detection System (IDS) mechanism which increases the integrity IDS of using digital signature.ACK digitally signed before its reach destination. In EACCK chances to make false acknowledgement. EACCK uses DSR routing protocol for identifying the route.DSR causes more Routing Overhead. Instead of DSR, AODV is used for route discovery. AODV has potentially less routing overhead than other protocol and AODV route replies only carry the destination IP address and the sequence number. The advantage of AODV is that it is adaptable to highly dynamic networks. Eliptic curve cryptography (ECC) can be developed in order to make the path more secure and also used to eliminate the requirement of pre-distributed keys. Key exchange (also known as "key establishment") is a method by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt the messages received.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords