CFP last date
20 January 2025
Reseach Article

Secure Data Transmission in MANET

by Vaishnavi Kanta, Sneha Singh, Sakshi, Sandhya Katiyar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 22
Year of Publication: 2019
Authors: Vaishnavi Kanta, Sneha Singh, Sakshi, Sandhya Katiyar
10.5120/ijca2019918970

Vaishnavi Kanta, Sneha Singh, Sakshi, Sandhya Katiyar . Secure Data Transmission in MANET. International Journal of Computer Applications. 178, 22 ( Jun 2019), 23-28. DOI=10.5120/ijca2019918970

@article{ 10.5120/ijca2019918970,
author = { Vaishnavi Kanta, Sneha Singh, Sakshi, Sandhya Katiyar },
title = { Secure Data Transmission in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 22 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number22/30668-2019918970/ },
doi = { 10.5120/ijca2019918970 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:08.975177+05:30
%A Vaishnavi Kanta
%A Sneha Singh
%A Sakshi
%A Sandhya Katiyar
%T Secure Data Transmission in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 22
%P 23-28
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network Security is a complex subject that can be intercepted by well versed and skilled people.Today, with increase in networking, the folks need to know the importance of security in network. Cryptography is a field for providing security to the networks and protecting information and communication. Even after providing securities, the network is vulnerable to some of the attacks in different networking areas like Man-in-the middle attack in the area of key exchange protocol.. Statistical tests are used to check these sequences, before calculating the private key and the shared key. In the paper, the generated binary sequence is converted into Octal instead of Decimal so that the memories utilized by both the generated keys are reduced and the complexity is decreased. Decimal sequence is of 10 bits whereas octal sequence is of 8 bits, so changing the sequence to Octal instead of Decimal will result in the reduction of 2 bits which may eventually reduce the complexity and memories utilized. Also, converting the binary sequence to octal allows the password to be minimum 128-bits . Previously, the password was set to the limit 256-bits range but now the limit is lowered to 128-bits range. In future, this method can be implemented on other encryption methodologies to provide a secure environment for secure transmission of data.

References
  1. R.Pranesh, V.Harish, M.Vigneshwaran, G.Manikandan, “A New Approach for Secure Data Transmission”,2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT].
  2. Aqeel Sahi Khader, David Lai, “Preventing Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Protocol”, 22nd International Conference on Telecommunications (ICT 2015).
  3. Nan Li, “Research on Diffie-Hellman Key Exchange Protocol”,2010 2nd International Conference on Computer Engineering and Technology, pp.Volume 4- 634-637.
  4. Bharat Bhushan,G Sahoo, Amit Kumar Rai, “Man-In-The-Middle Attack in Wireless and Computer
  5. Networking- A review”,2017 IEEE.
  6. https://searchsecurity.techtarget.com/definition/Diffie-Hellman-key-exchange
  7. S. M. Hosseini, H. Karimi, and M. V. Jahan, "Generating pseudorandom numbers by combining two systems with complex behaviors,"Journal of Information Security and Applications, pp. 149–62, 2014.
  8. Kapil M. Jain, Manoj V. Jain , Jay L. Borade “ A Survey on Man in the Middle Attack” , IJSTE- International Journal of Science Technology &Engineering , 2016
  9. Abhishek Bhardwaj, Subhranil Som “Study of Different Cryptographic Technique and Challenges in Future” ,1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)2016
  10. Dudhatra Nilesh, Prof. Malti Nagle “The New Cryptography Algorithm with High Throughput”, International Conference on Computer Communication and Informatics (ICCCI -2014), Coimbatore
  11. Manoj Ranjan Mishra, Jayaprakash Kar “ A STUDY ON DIFFIE-HELLMAN KEY EXCHANGE
  12. PROTOCOLS” ,International Journal of Pure and Applied Mathematics, 2017
  13. K.Suganya , K.Ramya “Performance study on Diffie Hellman Key Exchange Algorithm” International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2014
  14. Gopi Nath Nayak ,Shefalika Ghosh Samaddar “Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions “, Department of Computer Science and Engineering Motilal Nehru National Institute of Technology ,Allahabad
  15. Sonia Rachel , Subhashkar S ,” An Overview of the Man-In-The-Middle Attack”, National Conference On Contemporary Research and Innovations in Computer Science (NCCRICS), 2017
  16. Sulochana Devi, Ritu Makani ,”Encoding N-party Man-In-Middle Attack for Diffie–Hellman Algorithm in a Client-Server Paradigm”, International Journal of Computer Science and Information Technologie (IJCSIT),2015
  17. Sarita Kumari “ A research Paper on Cryptography Encryption and Compression Techniques”, International Journal Of Engineering And Computer Science, 201
Index Terms

Computer Science
Information Sciences

Keywords

Diffie-Hellman network security complexity