Skip to main content

Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

  • 1738 Accesses

Abstract

A mobile ad hoc network (MANET) is a infrastructure-less network of mobile devices connected without any wires. Energy saving is an emerging issue in Mobile Ad Hoc Networks. Recent research works shows that network coding can help to reduce the energy consumption in MANETs by using less transmissions. Besides transmission cost, other main sources of energy consumption are data encryption or decryption process. Due to the dynamic nature of MANETs leads the networks more prone to various security threats. So the security needs are higher in MANETs in comparing with wired networks. Great security and authentication along with efficient power utilization and robustness are needed for the MANETs for successful transmission. Here proposes a new lightweight elliptic curve cryptography (ECC) based encryption scheme to provide confidentiality for MANETs in an energy-efficient way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X(.S).: A lightweight encryption scheme for network-coded mobile Ad Hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)

    Article  Google Scholar 

  2. Chehal, R., Singh, K., Singh, K.: Efficiency and security of data with symmetric encryption algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(8), 472–475 (2012)

    Google Scholar 

  3. Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128–143 (2006)

    Article  Google Scholar 

  4. Suhashini1, C., Sivakumar, S.: A secure approach with physical layer encryption in MANET. In: International Conference on Engineering Technology and Science (ICETS 2014), pp. 177–181, February 2014

    Google Scholar 

  5. Kumar, G., Saha, R., Kumar Rai, M.: DSAB A hybrid approach for providing security in MANET. Int. J. Inf. Secur. Sci., 82–87, July 2012

    Google Scholar 

  6. Komninos, N., Soroush, H., Salajegheh, M.: Algorithms & security group athens information technology. LEE: Light-Weight Energy-Efficient Encryption Algorithm for Sensor Networks, 1–6, January 2009

    Google Scholar 

  7. Ranaut, D., Lal, M.: A review on security issues and encryption algorithms in Mobile Ad-hoc Network. Int. J. Sci. Res. (IJSR), 146–148, March 2012

    Google Scholar 

  8. Kumar, A., Tyagi, S.S., Rana, M., Aggarwal, N., Bhadana, P.: A comparative study of public key cryptosystem based on ECC and RSA. Int. J. Comput. Sci. Eng. (IJCSE), 1904–1909, May 2011

    Google Scholar 

  9. Kofahi, N.A.: Yarmouk University Irbid, Jordan: “An empirical study to compare the performance of some symmetric and asymmetric ciphers". Int. J. Secur. Appl., 1–15 (2013)

    Google Scholar 

  10. Padma, B., Chandravathi, D., Prapoorna Roja, P.: Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitzs Method. Int. J. Comput. Sci. Eng. 2(5), 1904–1907 (2010)

    Google Scholar 

  11. Anoop, M.S.: Elliptic Curve Cryptography An Implementation Guide, pp. 1–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepa S. Nair .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Nair, D.S., Muhammed Ilyas, H. (2015). Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics