Robust authenticated encryption scheme with multiple keys for ad hoc networks

Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiv...

Full description

Saved in:
Bibliographic Details
Main Authors: Kakkar, Ajay (Author), Singh, Maninder (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-07-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiveness of the work has been validated by extensive simulations on various combination in terms of S-Boxes, key and data length. The proposed work is a collaboration of optimal selection of S-Boxes, key and data lengths with evaluation of heat dissipation. The work has been carried out to develop an optimized efficient key management technique to reduce the time available for hackers. To verify the effectiveness of proposed algorithm, the results have been compared with K. Xue et al. (2013) , Li et al. (2011) and S. K. Sood et al.'s protocol (2011)
Item Description:https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18511