We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Encryption Algorithm for End-to-End Secure Data Transmission in MANET

by Rohan Rayarikar, Ajinkya Bokil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 16
Year of Publication: 2012
Authors: Rohan Rayarikar, Ajinkya Bokil
10.5120/8977-3187

Rohan Rayarikar, Ajinkya Bokil . An Encryption Algorithm for End-to-End Secure Data Transmission in MANET. International Journal of Computer Applications. 56, 16 ( October 2012), 29-33. DOI=10.5120/8977-3187

@article{ 10.5120/8977-3187,
author = { Rohan Rayarikar, Ajinkya Bokil },
title = { An Encryption Algorithm for End-to-End Secure Data Transmission in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 16 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number16/8977-3187/ },
doi = { 10.5120/8977-3187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:02.109046+05:30
%A Rohan Rayarikar
%A Ajinkya Bokil
%T An Encryption Algorithm for End-to-End Secure Data Transmission in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 16
%P 29-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is of prime importance when confidential data is transmitted over wireless network. Numerous encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i. e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks. This algorithm proves particularly useful while transmitting confidential data over a Bluetooth or wifi network. This algorithm is implemented in the Application layer of the device. The details of implementation are given in the article.

References
  1. J. Daemen and V. Rijmen, AES Proposal: Rijndael, NIST's AES home page, http ://www:nist:gov/aes.
  2. "Announcing the Advanced Encryption Standard (AES)", Federal Information Processing Standards Publication 197, November 2001
  3. Priyanka Pimpale, Rohan Rayarikar and Sanket Upadhyay, "Modifications to AES Algorithm for Complex Encryption", IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 10, October 2011.
  4. Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah "An Encryption Algorithm for Secure Data Transmission", IJCSNS International Journal of Computer Application, VOL. 40 No. 7, February 2012.
  5. Sakib, Rizwanul Karim; Reza, Bisway "Security Issues in VANET" BRAC University Institutional Reposistory, April 2010
  6. Brent A. Peacock "CONNECTING THE EDGE: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare" Blue Horizons Paper, Center for Strategy and Technology, Air War College, April 2007
  7. John A. Clark, John Murdoch, John A. McDermid, Sevil Sen, Howard R. Chivers, Olwen Worthington and Pankaj Rohatgi, "Threat Modelling for Mobile Ad Hoc andSensor Networks" ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Algorithm Matrix Transformation Complement Feistal Dynamic Row Modification Row Column Swapping.