Downloads: 120 | Views: 250
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.2 / 10
Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)
J Rajeshwar, G Narsimha
Abstract: A mobile ad hoc network (MANET) is an infrastructure less and autonomous network where a set of nodes are connected by wireless links where each node works as both a router and an end system. Due to vulnerable features of MANET it is prone to several attacks from insider as well as outsider, so security is a major requirement for this it is using several cipher suites in order to have a strong security features. In my research cryptographic computations are playing vital role for that reason in this paper we want to discuss the various available cipher suites and the various cryptographic functions. And mainly discuss the various secure routing protocols that how they are using cipher suites. Routing is one of the basic networking functions in mobile ad hoc networks for that reason especially we are concentrating on routing security of a MANET and role of cipher suites in providing security to the routing of a MANET.
Keywords: MANET, Cipher Suite, Cryptographic Computations, Hash functions
Edition: Volume 2 Issue 3, March 2013
Pages: 316 - 318
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 99
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017
Pages: 2718 - 2725Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing
Safa S. Abdul-Jabbar, Loay E. George
Downloads: 112
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1292 - 1295Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja, P. Srilatha
Downloads: 120
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 917 - 923Trusted Third Party Framework for Data Security in Cloud Computing Environment
Ravuri. Venkata Bhargavi, K. Narayana Rao
Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1113 - 1116A Survey on Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
Ghorpade Sneha, Dr. S. N. Kini