• Corpus ID: 31112883

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

@inproceedings{Javheri2014SecureDC,
  title={Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network},
  author={Snehal Javheri and Rahul Kulkarni},
  year={2014}
}
DNA cryptography is a new promising direction in cryptography research that emerged with the evolution in DNA computing field. DNA can be used not only to store and transmit the information, but also to perform computation. The extensive parallelism and extraordinary information density inbuilt in this molecule are exploited for cryptographic purposes. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks… 

Figures from this paper

Self Organized Gradient Boosting Key Authentication for Secured Data Communication in Mobile Ad-hoc Network

TLDR
The simulation result shows that the SOGBKA technique is able to improve the throughput rate and also reduces time taken for secured data delivery in MANETs when compared to the state-of-the-art works.

References

SHOWING 1-10 OF 21 REFERENCES

Secure data communication and cryptography based on DNA based message encoding

TLDR
A new method of DNA based encryption with a strong key of 256 bit is used and this method will provide better and enhanced security against intruder's attack in the message.

An Improved Symmetric Key Cryptography with DNA Based Strong Cipher

TLDR
The theoretical analysis and implementations shows the proposed DNA cryptography method to be efficient in computation, storage and transmission; and it is very powerful against certain attacks.

Review on the Advancements of DNA Cryptography

TLDR
By reviewing all the potential and cutting edge technology of current research, this paper shows the directions that need to be addressed further in the field of DNA cryptography.

A Literature Review of Security Attack in Mobile Ad-hoc Networks

TLDR
Different routing attacks, such as active (flooding, black hole, spoofing, wormhole) and passive(eavesdropping, traffic monitoring, traffic analysis) are described.

Securing ad hoc networks

TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.

Security Issues regarding MANET (Mobile Ad Hoc Networks) : Challenges and Solutions

TLDR
In this report, the aim of the thesis is to discuss different aspects of security in MANET and implement some of the solutions and comparative study of different routing protocol security threats within MANET network like intruder behavior, tapping and integrity, and MANET link layer and network layer operations with respect to information security.

A Review of ‘MANET’s Security Aspects and Challenges’

TLDR
The complete security solution requires the prevention, detection and reaction mechanisms applied in MANET, and it is found that necessity of secure routing protocol is still a burning question.

Security Threats in Mobile Ad Hoc Networks

TLDR
This chapter provides a comprehensive survey of attacks against a specific type of target, namely the routing protocols used by MANETs, and presents a detailed classification of the attacks/attackers against these complex distributed systems.

Secure routing for mobile ad hoc networks

TLDR
The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.

Toward secure key distribution in truly ad-hoc networks

TLDR
This work proposes to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks.