{"title":"集成加密技术在Ad-Hoc网络组播协议认证中的应用","authors":"Tintu Devasia, R. Visakh","doi":"10.1109/ICACC.2013.90","DOIUrl":null,"url":null,"abstract":"Ad-hoc networks are infrastructure-less and without central administration control, minimal configuration and quick deployment make ad-hoc networks suitable for emergency situations like natural disasters or military conflicts. These applications require multicast data transmissions and the data has to be securely passed through the network to the intended receivers. The techniques that are applied for security should also prevent an opponent from learning the contents of these transmissions. Several authentication protocols have been proposed to improve the security of multicast traffic. But not much work has been done on transmitting the data securely in multicast traffic. In the proposed method symmetric encryption is applied to provide confidentiality along with message authentication codes. The performance of various symmetric algorithms such as AES, DES, 3DES and blowfish to the proposed method is analyzed. Simulation results are given to demonstrate the effectiveness of each algorithm.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrating Encryption Technique in Authentication of Multicast Protocol for Ad-Hoc Networks\",\"authors\":\"Tintu Devasia, R. Visakh\",\"doi\":\"10.1109/ICACC.2013.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad-hoc networks are infrastructure-less and without central administration control, minimal configuration and quick deployment make ad-hoc networks suitable for emergency situations like natural disasters or military conflicts. These applications require multicast data transmissions and the data has to be securely passed through the network to the intended receivers. The techniques that are applied for security should also prevent an opponent from learning the contents of these transmissions. Several authentication protocols have been proposed to improve the security of multicast traffic. But not much work has been done on transmitting the data securely in multicast traffic. In the proposed method symmetric encryption is applied to provide confidentiality along with message authentication codes. The performance of various symmetric algorithms such as AES, DES, 3DES and blowfish to the proposed method is analyzed. Simulation results are given to demonstrate the effectiveness of each algorithm.\",\"PeriodicalId\":109537,\"journal\":{\"name\":\"2013 Third International Conference on Advances in Computing and Communications\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Third International Conference on Advances in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACC.2013.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third International Conference on Advances in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC.2013.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrating Encryption Technique in Authentication of Multicast Protocol for Ad-Hoc Networks
Ad-hoc networks are infrastructure-less and without central administration control, minimal configuration and quick deployment make ad-hoc networks suitable for emergency situations like natural disasters or military conflicts. These applications require multicast data transmissions and the data has to be securely passed through the network to the intended receivers. The techniques that are applied for security should also prevent an opponent from learning the contents of these transmissions. Several authentication protocols have been proposed to improve the security of multicast traffic. But not much work has been done on transmitting the data securely in multicast traffic. In the proposed method symmetric encryption is applied to provide confidentiality along with message authentication codes. The performance of various symmetric algorithms such as AES, DES, 3DES and blowfish to the proposed method is analyzed. Simulation results are given to demonstrate the effectiveness of each algorithm.