International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 250

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.2 / 10


     

Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)

J Rajeshwar, G Narsimha


Abstract: A mobile ad hoc network (MANET) is an infrastructure less and autonomous network where a set of nodes are connected by wireless links where each node works as both a router and an end system. Due to vulnerable features of MANET it is prone to several attacks from insider as well as outsider, so security is a major requirement for this it is using several cipher suites in order to have a strong security features. In my research cryptographic computations are playing vital role for that reason in this paper we want to discuss the various available cipher suites and the various cryptographic functions. And mainly discuss the various secure routing protocols that how they are using cipher suites. Routing is one of the basic networking functions in mobile ad hoc networks for that reason especially we are concentrating on routing security of a MANET and role of cipher suites in providing security to the routing of a MANET.


Keywords: MANET, Cipher Suite, Cryptographic Computations, Hash functions


Edition: Volume 2 Issue 3, March 2013


Pages: 316 - 318



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
J Rajeshwar, G Narsimha, "Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 316-318, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013619, DOI: https://www.doi.org/10.21275/IJSRON2013619



Similar Articles

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2718 - 2725

Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing

Safa S. Abdul-Jabbar, Loay E. George

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this Article

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 917 - 923

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi, K. Narayana Rao

Share this Article

Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1113 - 1116

A Survey on Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage

Ghorpade Sneha, Dr. S. N. Kini

Share this Article
Top