Filters








7,389 Hits in 3.8 sec

Ad Hoc Multi-Input Functional Encryption

Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler, Michael Wagner
2020 Innovations in Theoretical Computer Science  
A primitive called multi-input functional encryption (MIFE), due to Goldwasser et al.  ...  We provide a direct construction of ad hoc MIFE for the inner product functionality based on the Learning with Errors (LWE) assumption.  ...  Ad hoc Multi-Input Functional Encryption We are now ready to define our new notion of ad hoc multi-input functional encryption (MIFE).  ... 
doi:10.4230/lipics.itcs.2020.40 dblp:conf/innovations/AgrawalCFGOT20 fatcat:kftvkqieurgtbdftsofejm6lbe

An Encrypted Trust-Based Routing Protocol [article]

Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib
2015 arXiv   pre-print
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based  ...  In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme.  ...  Wireless Ad-Hoc Network A wireless ad-hoc network is constituted by a standalone architecture that is infrastructure-less, with no specific topology pre-defined.  ... 
arXiv:1512.03280v1 fatcat:2cthuhpzirf5lnngx4gxupwu7i

Ad Hoc PSM Protocols: Secure Computation Without Coordination [chapter]

Amos Beimel, Yuval Ishai, Eyal Kushilevitz
2017 Lecture Notes in Computer Science  
hoc PSM protocols for polynomial-time computable functions can be based on a one-way function.  ...  We present several different constructions of ad hoc PSM protocols from standard PSM protocols.  ...  We thank David Cash and David Wu for helpful discussions about Order Revealing Encryption.  ... 
doi:10.1007/978-3-319-56617-7_20 fatcat:4lvchsf33nccfa7rve57dm3u7y

Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement

Laith Ali Abdul-Rahaim
2015 American Journal of Networks and Communications  
Results shows great data security and BER over wireless channels based Ad Hoc network.  ...  The encrypted message consists the wavelet decomposition vector. The key is used for authorization purpose to access the network.  ...  Figure 11 . 11 Received data over Ad Hoc network with decryption. Design of Secure Ad Hoc Network Using Three Dimensional Discrete Transmitted data over Ad Hoc network with encryption.  ... 
doi:10.11648/j.ajnc.s.2015040301.17 fatcat:z5fibhcedncdjif3bi3kjtzc3e

Novel Technique of Multipath Routing Protocol In Ad hoc Network

D.S Vinod
2012 International Journal of Computer Networks & Communications  
We proposed novel technique in existing ad hoc multipath security solutions which is better compared to SDMP (Securing Data based Multipath Routing).The Proposed Method considers RSA Encryption technique  ...  Ad hoc network characteristics should be taken into consideration to be able to design efficient solutions.  ...  Securing data based multipath routing in ad hoc networks (SDMP) The idea behind this protocol is to divide the initial message into parts then to encrypt and combine these parts by pairs.  ... 
doi:10.5121/ijcnc.2012.4308 fatcat:5z6v63e5zvda5nuu6jl32sl33y

Two Fish Cryptography for Data Security in Network Communication

2019 International journal of recent technology and engineering  
The study of secure communication techniques is known as cryptography which plays important role in wireless ad hoc network.  ...  An extended Ad-hoc On-Demand Distance Vector (AODV) protocol uses Distributed Coordination Function to search the stable routing.  ...  The paper [9] focuses on mobile ad hoc network with the voice call problem employs IEEE 802.11b standard.  ... 
doi:10.35940/ijrte.b1194.0782s419 fatcat:io662g22afgcvfp2dbqexatb7m

nA Robust and Secure Lightweight Authentication for the Limited Resource Wireless Ad-hoc Network

Preet Kamal Sharma, Dinesh Kumar
2016 Indian Journal of Science and Technology  
Objectives: The proposed security model is specifically designed to increase the level of the security by implementing the node integrity verification and data encryption service over the wireless ad-hoc  ...  The proposed authentication and security model for wireless ad-hoc routing has been analyzed for its performance on the basis of the specific performance parameters.  ...  The primary inputs of the public cryptosystem function lies with the message or string m or key k, which can be described as following: • F(m,k)=mkmodn(9) • The two cases of encryption and decryption can  ... 
doi:10.17485/ijst/2015/v8i1/101372 fatcat:skyupntwbjec5jw24sij2jakpe

Public Key Cryptography Sans Certificates in Ad Hoc Networks [chapter]

Nitesh Saxena
2006 Lecture Notes in Computer Science  
In this paper, we show how to perform necessary public key operations without node-specific certificates in ad hoc networks.  ...  Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center.  ...  Introduction Securing communication in so-called ad hoc networks, such as mobile ad hoc networks and sensor networks, is a challenging problem due to the lack of a trusted centralized authority.  ... 
doi:10.1007/11767480_26 fatcat:5s43yatu4nblvg5mi2dswuimii

Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks

A.A. Adas A.A. Adas
2017 journal of King Abdulaziz University Engineering Sciences  
AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks.  ...  This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security).  ...  The major functionalities of AODV are dynamic, self-starting, multi-hop routing between participating nodes interesting to establish and maintain an Ad-Hoc network.  ... 
doi:10.4197/eng.28-1.3 fatcat:pysbzyxy5vfzrguxnicem7en3u

Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

Rakesh Kumar, Dr. Piush Verma, Dr. Yaduvir Singh
2011 International Journal of Computer Applications  
In this paper, we understand the various security related issues related to mobile ad hoc network.  ...  Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected.  ...  , and non-repudiation of communication in ad hoc networks  ... 
doi:10.5120/1751-2385 fatcat:3nfqw6maljfmrkgh6cel7c7crq

Mobile Ad Hoc Networks And It'S Routing Protocols

Rakesh Kumar, Piush Verma, Yaduvir Singh
2013 Zenodo  
A mobile ad hoc network (MANET) is a self configuring network, without any centralized control. The topology of this network is not always defined.  ...  This paper begins with an overview of mobile ad hoc networks. Then it proceeds with the overview of routing protocols used in the MANETS, their properties and simulation methods.  ...  functions of comparison matrix in binary form Fig. 7 Delivery of 1st character of encrypted message V.  ... 
doi:10.5281/zenodo.1088787 fatcat:w3mndf47ube37ho3ybupmhinzu

Customized Hardware Crypto Engine for Wireless Sensor Networks

Medhat Awadalla, Ahmed Al Maashri, Lavanya Pathuri, Afaq Ahmad
2017 Indonesian Journal of Electrical Engineering and Computer Science  
Significant progress is visible in the fields of Ad hoc network (AD-HOC) [7] . AD-HOC is a mature embedded computing wireless communication technology.  ...  This part provides several prefaces of AD-HOC and establishes necessary improvements of WSN from AD-HOC.  ... 
doi:10.11591/ijeecs.v7.i1.pp263-275 fatcat:2si6livgjbhjff24svx345oxzm

Signcryption scheme based on schnorr digital signature [article]

Laura Savu
2012 arXiv   pre-print
This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually  ...  The mobile ad hoc networks get subjected to security threats like other wireless networks.  ...  These include: • secure ATM networks, • secure routing in mobile ad hoc networks, • secure voice over IP (VoIP) solutions, • encrypted email authentication by firewalls, • secure message transmission by  ... 
arXiv:1202.1663v1 fatcat:cfngrkm4dzdlvhsefek4k6kmam

How to Generate Universally Verifiable Signatures in Ad-Hoc Networks [chapter]

KyungKeun Lee, JoongHyo Oh, SangJae Moon
2006 Lecture Notes in Computer Science  
Our scheme is an a priori and non-interactive (for signers) protocol in which a mobile verifier is given an ad-hoc signature as well as a corresponding infra (actually encrypted) signature.  ...  Within an ad-hoc environment, a user can also generate and verify digital signatures with the assistance of pre-established ad-hoc CA [ZH99].  ...  We construct a simulator algorithm S, which takes at least one of an ad-hoc key y 1 and infra key y 2 as input.  ... 
doi:10.1007/11801412_12 fatcat:ptv27kry25gcnllca33wzv3bza

Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique

V. Umadevi, C. Chandrasekar
2015 International Journal of Computer Applications  
Advanced Encryption Standard (AES) is based on the principle of substitution and permutation keying model adapted as node ids in the mobile ad-hoc network.  ...  Intrusion detection is crucial in improving the performance of mobile ad-hoc network.  ...  Mobile Ad-hoc NETworks (MANETs) have received significant attention due to the multi hop nature and infrastructure-less transmission.  ... 
doi:10.5120/ijca2015907445 fatcat:sw6qyzfm3zewrb7bppldxcvv54
« Previous Showing results 1 — 15 out of 7,389 results