Comparative Analysis of Different Encryption Techniques in Mobile Ad-Hoc Networks (MANETs)

Main Article Content

Abstract

This paper is in depth analysis of Data  Encryption Standard  (DES),  Triple DES (3DES) and Advanced Encryption Standard (AES)  even secret writing algorithms in painter was done victimization the Network Simulator 2(NS-2) in terms of energy consumption, information transfer time, End-to-End delay time and out turn with varied information sizes. 2 simulation models were   adopted: the primary simulates  the network performance assumptive the supply of the common key, and also the second simulates the network performance as well as the employment of the Diffie Hellman Key Exchange (DHKE) protocol within the  key management part. The obtained simulation results showed the prevalence of AES over  DES by sixty fifth, seventieth and eighty three in term   of the  energy consumption, information transfer time, and  network out turn severally. On the opposite hand, the results showed that AES is healthier than 3DES by around ninetieth for all of the performance metrics. Supported these results the AES was the suggested secret writing theme 

Article Details

References

[1] Nadeem, A. and Howarth, M. P. (2013), A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks. IEEE Communications Surveys &Tutorials, 15(4), 2027-2045.

[2] Chen, J. and Wu, J. (2010), A Survey on Cryptography Applied to Secure Mobile Adhoc Networks and Wireless Sensor networks. Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, IGI Global, AH ALTALHI, 5, 2414-2424.

[3] Du, D. and Xiong, H. (2011), A Dynamic Key Management Scheme for MANETs. In Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), IEEE, 1, 779-783.

[4] Mokhtarnameh, R. Muthuvelu, N. Ho, S. B. and Chai, I. (2010), A Comparison Study on Key Exchange-Authentication Protocol. International Journal of Computer Applications IJCA, 7(5), 5-11.

[5] Abdul, D. S. Elminaam, H. M. A. K. and Hadhoud, M. M. (2009), Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security, 8(12), 78-85.

[6] Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M. and Al-Nabhani, Y. (2010). New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085.

[7] Stallings, W. (2006), Cryptography and Network Security: Principles and Practice, (5^th ed.). India: Pearson Education.

[8] Mandal, A. K. Parakash, C. and Tiwari, A. (2012), Performance Evaluation of Cryptographic Algorithms: DES and AES. In

Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students' Conference, IEEE, 1-5.

[9] Umaparvathi, M. and Varughese, D. K. (2010), Evaluation of Symmetric Encryption Algorithms for MANETs. In Computational Intelligence and Computing Research (ICCIC), IEEE International Conference, 1-3.

[10] Sahu, S. K. and Kushwaha, A. (2014), Performance Analysis of Symmetric Encryption Algorithms for Mobile Ad hoc Network. In International Journal of Emerging Technology and Advanced Engineering IJETAE, 4(6).

[11] Norouzi, M. esmaeel Akbari, M. and Souri, A. (2012), Optimization of Security Performance in MANET. Journal of American Science, 8(6).

[12] Kashani, A. A. and Mahriyar, H. (2014), A New Method for Securely Streaming Realtime Video in Ad hoc Networks. Advances in Environmental Biology, 8(10), 1331-1338.

[13] Sandhiya, D. Sangeetha, K. and Latha, R. S. (2014), Adaptive AC Knowledgement Technique with Key Exchange Mechanism for

MANET. In Electronics and Communication Systems (ICECS), 2014 International Conference, IEEE, 1-5.

[14] Taneja, S. Kush, A. and Hwang, C. J. (2011), Secret Key Establishment for Symmetric Encryption over Adhoc Networks. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 2).

[15] Fall, K. and Varadhan, K. (2002). The NS Manual. Notes and Documentation on the Software NS2-Simulator.

[16] Elminaam, D. S. Kader, H. M. A. and Hadhoud, M. M. (2009), Energy Efficiency of Encryption Schemes for Wireless Devices.

International Journal of Computer Theory and Engineering, 1, 302-309.

[17] Biham, E. (Ed.). (2006), Fast Software Encryption. 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Springer, Proceedings (Vol. 1267).

[18] Rhett, (1999), x86 CPU Reference, Part 2. Retrieved May 25, 2015, from http://alasir.com/x86ref/index.htm