New key generation and encryption algorithms for privacy preservation in mobile Ad Hoc networks

Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

Mobile Ad Hoc Networks (MANETs) get widespread applications along with the evolving technologies. However, MANETs are at risk due to the shortage of security mechanisms. In this paper, we propose new algorithms for key generation and encryption for privacy preservation in MANETs. Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas the encryption/decryption algorithm utilizes the One Time Pad (OTP) system by adding scrambling factors for data confidentiality which satisfies the randomness, diffusion, and confusion tests. Simulation of the proposed algorithms was conducted using Matlab and NS-2. Experiment results showed that the proposed algorithms produced random key sequences and Ciphertexts. Through several tests i.e. speed, correlation and autocorrelation, diffusion, and confusion tests, the simulation result showed the superiority of our algorithms over the other algorithms. For the proof of concept, our algorithms have been simulated in the network simulator, and the result showed that along with the increase of the number of nodes, the throughput of the network increased, while the delay is relatively constant around 6000 μs for 20 up to 70 nodes.

Original languageEnglish
Pages (from-to)376-385
Number of pages10
JournalInternational Journal of Communication Networks and Information Security
Volume9
Issue number3
Publication statusPublished - 1 Jan 2017

Keywords

  • Encryption/Decryption
  • Fibonacci
  • Key generation
  • MANET
  • One-time pad
  • Privacy preservation
  • Scrambling factor

Fingerprint

Dive into the research topics of 'New key generation and encryption algorithms for privacy preservation in mobile Ad Hoc networks'. Together they form a unique fingerprint.

Cite this