2017
DOI: 10.1155/2017/4657831
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Partial Permutation Encryption on Network Coded MANETs

Abstract: Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. In this regard, we have focused on network coding which is a lightweight mechanism that can also be used for data confidentiality. In this paper, we have further reduced the cost of network cod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 31 publications
(45 reference statements)
0
8
0
Order By: Relevance
“…Figure 7 shows the end-to-end delay (in microseconds) analysis among the proposed and the existing Energy Efficient Partial Permutation Encryption (EEPPM) protocol [15]. It is found that the proposed model achieves lesser end-to-end delay values compared to EEPPM.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 7 shows the end-to-end delay (in microseconds) analysis among the proposed and the existing Energy Efficient Partial Permutation Encryption (EEPPM) protocol [15]. It is found that the proposed model achieves lesser end-to-end delay values compared to EEPPM.…”
Section: Performance Analysismentioning
confidence: 99%
“…To secure communication among MANET nodes, various cryptography-based protocols have been proposed. Some well-known protocols are Efficient Node Admission and Certificateless Secure Communication (ENACSC) [13], Anonymous Location-Aided Routing (ALARM) [14], Energy-Efficient Partial Permutation Encryption (EEPPM) [15], Friend-Based Ad Hoc Routing to Establish Security (FACES) [16], Anonymous Multipath Routing Protocol (AMRP) [17], Statistical Traffic Pattern-Discovery System (STARS) [18], and Non-Interactive Self-Certification (NSC) [19]. However, these protocols are prone to various security threats and also consume more energy from the nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Tang et al [26] proposed a dynamic threelayer encryption scheme based on DES and network coding, with a low-complexity partial key update mechanism, which increases its adaptability to various cyber conditions. Khan et al [27] further reduced the cost of a network coding mechanism by reducing the size of data used for permutation. ey also proposed an algorithm for key generation and random permutation confusion key calculation.…”
Section: Related Workmentioning
confidence: 99%
“…Data sharing suffers from attacks especially due to having self‐organizing environment of the network infrastructure. Among these attacks, routing attacks have well‐known central focus although they might cause the most destructive damage in MANET . In Reference , encryption is applied on the data by using the symmetric cryptographic technique, which uses same key for encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%