CFP last date
20 January 2025
Reseach Article

Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)

by Sitanshu Singh, Sanjeev Sharma, Santosh Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 18
Year of Publication: 2012
Authors: Sitanshu Singh, Sanjeev Sharma, Santosh Sahu
10.5120/7290-0445

Sitanshu Singh, Sanjeev Sharma, Santosh Sahu . Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF). International Journal of Computer Applications. 47, 18 ( June 2012), 34-39. DOI=10.5120/7290-0445

@article{ 10.5120/7290-0445,
author = { Sitanshu Singh, Sanjeev Sharma, Santosh Sahu },
title = { Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF) },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 18 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number18/7290-0445/ },
doi = { 10.5120/7290-0445 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:42:13.157688+05:30
%A Sitanshu Singh
%A Sanjeev Sharma
%A Santosh Sahu
%T Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 18
%P 34-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we analyze the network performance with using Symmetric Key Cryptographic technique applying in AODV routing protocol with cyclic chain hash function (CCHF). Throughput and end to end delay of KK cryptographic (KKC) algorithm applying in AODV is less. If Symmetric Key Cryptographic technique used in AODV routing protocol with cyclic chain hash function has given maximum throughput and minimum end to end delay. In this dissertation, Key authentication is used in cyclic chain hash function. The proposed work we have implemented of the network performance. Shows the network performance of the proposed work is analysis of results. Network Simulator 2. 34 is used for Simulation of results.

References
  1. Yudhvir Singh, Dr. Yogesh Chaba "Security and Network Performance Evaluation of KK' Cryptographic Technique in Mobile Ad hoc Networks" IEEE International Advance Computing Conference (IACC 2009)
  2. Raymond G. Kammer, William M. Daley "U. S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology" DATA ENCRYPTION STANDARD (DES), FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, October 1999.
  3. Stephan Eichler, Christian Roman "Challenges of Secure Routing in MANETs: A Simulative Approach using" AODV-SEC Arcisstr. 21, 80333 München, Germany 2006.
  4. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," Internet Engineering Task Force (IETF) draft, November 2002. Available at http://www. ietf. org/internet-drafts/draft-ietf-manet-aodv-12. txt.
  5. S. Chang, M. Dworkin, Workshop Report, The First Cryptographic Hash Workshop, Report prepared, NIST 2005.
  6. E. Hyytiä, H. Koskinen, P. Lassila, A. Penttinen and J. Virtamo "Random Waypoint Model in Wireless Networks" University of Debrecen, Hungary, Networks and Algorithms: complexity in Physics and Computer Science Helsinki, June 16-19, 2005.
  7. Arun Kumar Bayya, Siddhartha Gupte, Yogesh Kumar Shukla ,Anil Garikapati "Security in Ad-hoc Networks" University of Kentucky, (December 2009).
  8. Naveen Choudhary "Constant Bit Rate Traffic Investigation for Network-on-Chip" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-5, November 2011.
  9. Jared Cordasco and Susanne Wetzel "Cryptographic vs. Trust-based Methods for MANET Routing Security, STM 2007.
  10. A. Santos, A. Edwards, R. M. Edwards, N. L. Seed "Performance evalution of routing protocol in vehicular ad hoc network and ubiquitous computing" international journals of ad hoc network and ubiquitous computing, 2005, volume 1.
  11. Wilson T. H. Woon, Tat chee wan, "performance evaluation of IEEE 802. 15. 4 wireless multihop network simulation and tested approach", international journals of ad hoc network and ubiquitous computing, volume 3, issue-1, 2008.
  12. RSA-PSS {Provable secure RSA Signatures and their Implementation" Johannes Block http://rsapss. hboeck. de/ 2011
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Network Ns 2. 34 Simulator Aodv Routing Protocol Symmetric Key Cryptography Hash Function