Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks

Though wireless networks provide great convenience to mobile users, they also give rise to non-trivial concerns about the security due to open channels and flexible mobility. An important concern is the securing of a communication link between any pair of nodes. Here, data encryption is deemed the primary solution to protect data confidentiality and integrity. However, the issue of traditional cryptographic techniques' application in wireless and mobile networks is significant to improve the performance of networks. In this article, we propose a hybrid encryption algorithm to deal with the applications of symmetric key and asymmetric key in wireless ad hoc networks. In particular, a public key is used as an authentication method to validate the identity of a legitimate node and to prevent unwanted parties from obtaining unauthorized data and resources. Our performance comparison shows that our proposed schemes have reasonable computational costs and communication overhead, provide reliable security, and at the same time, improve the efficiency of cryptographic techniques. In this way, our simulation results indicate that our algorithm is effective and practical for the data protection in wireless and mobile networks.

[1]  Deep Medhi,et al.  A key-chain-based keying scheme for many-to-many secure group communication , 2004, TSEC.

[2]  Lei Tang,et al.  A Secure Data Transmission Scheme for Mobile Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[3]  Chin-Ling Chen,et al.  A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security , 2007, The 9th International Conference on Advanced Communication Technology.

[4]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[5]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[6]  Joonsang Baek,et al.  Self-organised group key management for ad hoc networks , 2006, ASIACCS '06.

[7]  Riccardo Sisto,et al.  A configurable mobile agent data protection protocol , 2003, AAMAS '03.

[8]  S. Furuya,et al.  A Lightweight Encryption Method Suitable For Copyright Protection , 1998, International 1998 Conference on Consumer Electronics.

[9]  Ludwig Seitz,et al.  Secure communication for ad-hoc, federated groups , 2008, IDtrust '08.

[10]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[11]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[12]  Yuh-Min Tseng A heterogeneous-network aided public-key management scheme for mobile ad hoc networks , 2007, Int. J. Netw. Manag..

[13]  T. Jamil The Rijndael algorithm , 2004, IEEE Potentials.

[14]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[15]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks: Boukerche/Mobile , 2008 .