International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 294

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.2 / 10


     

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil


Abstract: every time while transferring or broadcasting data to the remote group of wireless ad-hoc network (Mobile ad-hoc node) problem is occurred. The major challenges that are available in the existing system are, the overcome the problem of more communication required between sender and receiver, second is unavailability of fully trusted key server in cryptography system. The existing cryptography technique is not able to or cannot be deal with this problem. Here we are using new cryptography technique to achieve above goals, which is combination of traditional encryption techniques. Using this technique a members in group maintain public and secret keys. A remote sender can obtain a public key of receivers from key server for encryption and securely broadcast encrypted shared secret key to the intended member in group using combined encryption technique. On receiving, receiver uses its own secret key to decrypt shared secret decryption key


Keywords: wireless ad-hoc network, cryptography, broadcasting, Access control, secure transmission


Edition: Volume 3 Issue 12, December 2014


Pages: 1436 - 1439



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Nilesh T Patil, "Secure Transmission in Ad-hoc Network: Using Combined Cryptography", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1436-1439, https://www.ijsr.net/getabstract.php?paperid=SUB14501, DOI: https://www.doi.org/10.21275/SUB14501



Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 306 - 309

A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records

V. Jayaganesh

Share this Article

Downloads: 9 | Weekly Hits: ⮙3 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 844 - 850

Data-Driven Decision Making: Advanced Database Systems for Business Intelligence

Maria Anurag Reddy Basani, Anudeep Kandi

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article
Top