Robust authenticated encryption scheme with multiple keys for ad hoc networks

Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiv...

Full description

Saved in:
Bibliographic Details
Main Authors: Kakkar, Ajay (Author), Singh, Maninder (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-07-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02073 am a22003013u 4500
001 ijeecs18511_12582
042 |a dc 
100 1 0 |a Kakkar, Ajay  |e author 
100 1 0 |e contributor 
700 1 0 |a Singh, Maninder  |e author 
245 0 0 |a Robust authenticated encryption scheme with multiple keys for ad hoc networks 
260 |b Institute of Advanced Engineering and Science,   |c 2019-07-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18511 
520 |a Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiveness of the work has been validated by extensive simulations on various combination in terms of S-Boxes, key and data length. The proposed work is a collaboration of optimal selection of S-Boxes, key and data lengths with evaluation of heat dissipation. The work has been carried out to develop an optimized efficient key management technique to reduce the time available for hackers. To verify the effectiveness of proposed algorithm, the results have been compared with K. Xue et al. (2013) , Li et al. (2011) and S. K. Sood et al.'s protocol (2011) 
540 |a Copyright (c) 2019 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Ad hoc network, encryption, keys, hacking time 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 15, No 1: July 2019; 421-426 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v15.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18511/12582 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18511/12582  |z Get fulltext