Você está na página 1de 5

International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016

RESEARCH ARTICLE OPEN ACCESS

A Lightweight Encryption Scheme for


Network-Coded Mobile Ad Hoc Networks
Mohammed Tarique [1], Rohan Raul [2], Khalil Pinjari [3], Pranay Patil [4], Rohit
Shinde [5]
UG Students [1], [2], [4], & [5], Assistant Professor [3]
Department of Information Technology Engineering
Theem College of Engineering, Boisar
University of Mumbai
Maharashtra – India

ABSTRACT
Energy saving is very important matter of subject in Mobile Ad Hoc Net works (MANETs). Current studies show that
network coding can help lessen the energy consumption in MANETs by providing less transmission. Apart from
transmission cost, the other sources of energy consumption are data encryption/decryption. The studies show how to
control network coding to reduce the energy that is consumed by the data encryption in MANETs. It is interesting that
network coding has an agreeable property of key security, based on which encryption can be done quite well. In this
paper, we have proposed P-Coding, a lightweight encryption scheme to provide confidentiality for network-coded
MANETs in an energy-efficient way. The basic idea of P-Coding is to let the source randomly permute the symbols of
each packet (which is prefixed with its coding vector), before performing network coding operations. Without knowing
the permutation, eavesdroppers cannot locate coding vectors for correct decoding, and thus cannot obtain any
meaningful information.
Keywords :- Mobile ad hoc networks, energy saving, network coding, lightweight encryption

I. INTRODUCTION communicated between soldiers with mobile devices can


Mobile Ad Hoc Networks (MANET’s) are significant be very delicate, and should be kept confidential during
wireless commun ication models. Mobile Ad Hoc Netwo rk transmissions. The easiest approach in providing
(MANET) are in frastructure-less and dynamic network confidentiality to a network-coded MANETs will be to
involving wireless mobile nodes that communicate with encrypt the packet payload by using symmetric-key
each other without use of any integrated authority. The encryption algorithms. While this method is not that
mobile and infrastructure less nature of MANETs makes efficient reference [9] show that on a Motorola’s “Dragon
them fit for collecting alternative data in disastrous areas Ball” surrounded microprocessor ,it consumes around
and performing mission-critical co mmunicat ion in battle 13.9 micro to send a bit, while consumes another 7.9
fields. A serious matters in MANETs is how to reduce MicroJ per bit when symmetric-key algorith ms are used.
energy consumption and maintain a longer life t ime for Due to the ho mo morphic environ ment of HEFs, network
mobile nodes. Some energy efficient scheme are proposed coding can be performed straight on the encrypted coding
to determination this issue [2], [3], & [4] vectors, without impacting the standard network coding
Current studies that network coding [5] can help operations. In this paper we propose a new encryption
realize a lower energy consumption in MANETs [6], [7] system wh ich is a lightweight in totalling by leveraging
& [8]. The energy savings arise fro m fact that less network coding which makes it very beautiful in network-
transmission are required when in-network nodes are coded MANETs to further reduce energy consumption.
assisted to encoded packets. Energy consumption can also
come fro m encryption and decryption processes at each II. LITERATURE SURVEY
node, as most MANETs need some level of guard on their
A. “P-CODING: SECURE NETWORK CODING AGAINST
content. For model, in a battle field, the data
EAVESDROPPING ATTACKS’’

ISSN: 2347-8578 www.ijcstjournal.org Page 71


International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
In this paper [1], author focuses on basic privacy as C. “M INIMUM-ENERGY M ULTICAST IN M OBILE AD HOC
network coding is still vulnerable to eavesdropping NETWORKS USING NETWORK CODING’’
attacks, via which an enemy could co mpro mise the In this paper [6], author has proposed the min imu m
confidentiality of message content. Fundamental studies energy required for transmitting one bit of informat ion
mostly deal with eavesdroppers that could catch a limited through a network that represented the most economical
number of packets. But, real situations often consist of way to connect in the network. Further author focused on
more capable opponents, e.g., Global eavesdroppers, the layered classic of a wireless network, the min imu m
which can defeat these systems. In this paper, the author energy-per-bit for mu lticasting in a mobile ad hoc
proposed P-Coding, a novel security scheme against network had been found by a linear program; the
eavesdropping attacks in the network coding. P-Coding minimu m energy-per-b it could be attained by acting
can capably spoil g lobal eavesdroppers in a clear way by network coding. When comparing with conventional
using lightweight permutation encryption which is routing solutions, the network coding not only allows a
performed on each message and its coding vector. potentially lower energy-per-bit to be reached, but also
Moreover, P-Coding is very much highlighted in enables the perfect solution that could be started in
scalability and toughness, which enable it to be combined polynomial time, in sharp contrast with the NP-hardness
into practical network coded systems. Security analysis that constructs the minimu m-energy mu lticast tree wh ich
and simu lation results showed the efficiency of the P- results in the optimal routing solution. Later author
Coding scheme. focused on how the minimu m energy mu lticast
preparation is equivalent to a cost minimization with
linear edge-based rating, where the edge prices where the
energy-per-bits that were the corresponding physical
transmission links. Due to the linearity of the pricing
arrangement, the min imu m energy-per-b it for routing is
achievable by using a single delivery tree. A
categorization that consisted of tolerable rate reg ion for
routing with a single tree was presented. The min imu m
energy-per-bit for mu lticasting with routing was
originated by an integer lined program. Author showed
that the reduction of this integer linear program might
now be assumed as the optimizat ion for minimu m energy
Figure2.1.1: Enhanced P-Coding mu lticasting with network coding. In short, the author
presented a joining study of min imu m energy multicasting
B. “ALGORITHMS FOR ENERGY-EFFICIENT with network coding and routing.
M ULTICASTING IN STATIC AD HOC W IRELESS D. “NETWORK CODING- BASED BROADCAST IN M OBILE
NETWORKS’’ AD-HOC NETWORKS’’
In this paper [3], the author had addressed the challenge of In this paper [8], author introduced Broadcast operation,
mu lticasting in ad hoc wireles s networks fro m the which disseminates evidence network-wide, and is very
perspective of energy efficiency. Here the author had important in mult i-hop wireless networks. Owing to the
discussed the impact of the wireless intermed iate on the broadcast nature of wireless media, not all nodes need to
mu lticasting problem and the essential trade-offs that arise. transmit in order for the note to reach every node. Prior
Further the author proposed and evaluated several work on broadcast support could be classified as
algorith ms that defined mult icast trees for session or probabilistic i.e. each node rebroadcasted a packet with a
connection-oriented traffic when transceiver resources are given probability or determin istic approaches i.e. nodes
restricted. These algorithms selected the relay nodes and pre-selected a few neighbours for rebroadcasting. Further
the corresponding transmission power levels, and realized author showed how network-coding could be applied to a
different degrees of scalability and performance. Here deterministic broadcast methods, resulting in significant
author demonstrated the incorporation of energy reduction in the number of announcements in the network.
considerations into mult icast algorith ms wh ich could author proposed two algorith ms, that rely only on local
result in improved energy efficiency. two-hop topology information and made a wide use of

ISSN: 2347-8578 www.ijcstjournal.org Page 72


International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
opportunistic attending to reduce the number of proposed such a scheme. In this scheme, the source
transmissions: 1) a simp le XOR-based coding algorithm performed arbitrary linear coding on the messages that are
that provided up to 45% gained as compared to that a non- to be send and locks/encrypts the coding vectors by using
coding approach and 2) a Reed-Solo mon based coding the symmetric key which is shared between it and all
algorith m that determined the optimal coding gain sinks. Fanet al. [11] proposed encrypt coding vectors by
achieved for a coding algorithm that trusted only on local using Homo morphic Encryption Functions (HEFs) in an
confirmat ion, with gains up to 61% in the simulat ions end-to-end way.
result. Author also showed that the coding-based
F. DISADVANTAGE OF EXISTING SYSTEM
deterministic approach outclassed the coding-based
probabilistic approach. Owing to the homomo rphic nature of HEFs, network
coding can be performed conventional on the encrypted
E. “A STUDY OF THE ENERGY CONSUMPTION coding vectors, without impacting the standard network
CHARACTERISTICS OF CRYPTOGRAPHIC ALGORITHMS AND coding operations. However, the above two approaches
SECURITY PROTOCOLS’’ have large above with respect to either computation or
In this paper [9], author focused on how safety is galaxy, and may not be suitable for MANETs .
becoming an ordinary concern for a wide range of
electronic systems that operate, communicate, and store IV. PROPOSED SYSTEM
complex data. Author focuses on an important and The proposed system attempts to design a new
emerging group of such electronic systems which are encryption scheme that can fully adventure the security
battery-powered mobile applications, such as personal property of net-work coding. The coding vectors and the
digital assistants (PDAs) and cell phones, which are message content are both necessary for decoding,
strictly, constrained in the resources they possess, namely, arbitrarily reordering/mixing they will generate significant
CPU, cordless, and memo ry. Th is effort focuses on one confusion to the eavesdropping challenger. In specific, we
important constraint of such devices-battery life-and propose P-Coding wh ich is a lightweight encryption
inspects how it is impacted by the use of various security scheme to fight against eavesdroppers in network-coded
mechanis ms. Author showed a study on the energy MANETs. In a nutshell, with the help of permutation
consumption supplies of the most popular transport-layer encryption, P-Coding randomly mixes symbols of each
security protocol: Secure Sockets Layer (SSL). Also packed which is a coded packet (packet prefixed with its
author examined the impact of various limitations at the coding vector), so as to make it harder for eavesdroppers
protocol level such as authentication mechanisms, cipher to locate coding vectors for package decoding.
suites, and transaction sizes, etc. and the cryptographic
algorith m level (cipher modes, strength) on the overall 1) ADVANTAGES OF PROPOSED SYSTEM
energy consumption for secure data transactions. Author A fresh encryption scheme which is lightweight in control
proposed a measurement-based experimental test bed that by leveraging network coding, which makes it very
consisted of an iPAQ PDA which was connected to a gorgeous in network-coded MANETs to further reduce
wireless local area network (LAN) and running Linu x, a energy consumption.
PC-based data achievement system for real-time current We present here an analysis on the inherent weak security
measurement, the OpenSSL imple mentation of the SSL which is more accurate by network coding,
protocol, and the parameterizable SSL client and server
test program. Based on results, author discussed various 4.2 PROPOSED SYSTEM ARCHITECTURE
occasions for understanding energy-efficient applicat ions
of security protocols.

III. EXISTING SYSTEM


The straight approach to provide secrecy for network-
coded MANETs is to encrypt the packet load using
symmetric -key encryption algorith ms. The informat ion
fraternizat ion feature o f network coding which provides
an intrinsic security depending on which a more effect ive
Figure 4.2.1: Encrypted and Decrypted Permutation
cryptographic scheme can be designed. Vilelaet al. [10]

ISSN: 2347-8578 www.ijcstjournal.org Page 73


International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216,
July 2000.
V. CONCLUSION
[6] Y. Wu, P. Chou, and S. Kung, ‘‘M inimu m-
This project involved the education of energy saving Energy Multicast in Mobile Ad Hoc Networks
problem in MANETs based on the technique of network
using Network Coding,’’ IEEE Trans. Co mmun.,
coding. Preceding studies demonstrated that network vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
coding can shrink energy consumption with less
transmission in MANETs. P-Cod ing, a lightweight [7] C. Fragouli, J. W id mer, and J. Boudec, ‘‘A
encryption scheme on top of network coding, reduces Network Coding Approach to Energy Efficient
energy consumption in MANETs by decreasing the Broadcasting: Fro m Theory to Practice,’’ in Proc.
security cost. P-Coding events the intrinsic security stuff IEEE INFOCOM, 2006, pp. 1-11.
of network coding, and uses simple permutation [8] L. Li, R. Ramjee, M. Buddhikot, and S.Miller,
encryptions to generate great mistake to eavesdropping ‘‘Network Coding-Based Broadcast in Mobile
adversaries. It is publicised that P-Coding is efficient in Ad-Hoc Networks,’’ in Proc. IEEE INFOCOM,
calculation, and incurs less energy consumption for 2007, pp. 1739-1747.
encryptions/decryptions. Extending the Application of P-
Coding to other communication. [9] N.R. Potlapally, S. Rav i,A.Raghunathan, andN.K.
Jha, ‘‘AStudy of the Energy Consumption
Characteristics of Cryptographic Algorithms and
FUTURE WORK Security Protocols,’’ IEEE Trans. Mobile
Comput., vol. 5, no. 2, pp. 128-143, Feb. 2006.
The future work includes the application of Enhance P-
Coding to other statement networks, e.g. Vehicular Ad [10] J.P. Vilela, L. Lima, and J. Barros, ‘‘Lightweight
Hoc networks Security for Network Coding,’’ in Proc. IEEE
ICC, May 2008, pp. 1750-1754.

REFERENCES [11] Y. Fan, Y. Jiang, H. Zhu, and X. Shen, ‘‘An


Efficient Privacy-Preserving Scheme Against
[1] P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, Traffic Analysis in Network Coding,’’ in Proc.
‘‘P-coding: Secure Network Coding Against IEEE INFOCOM, Apr. 2009, pp. 2213-2221.
Eavesdropping Attacks,’’ in Proc. IEEE
[12] K. Bhattad and K.R. Narayanan, ‘‘Weakly
INFOCOM, Mar. 2010, pp. 1-9.
Secure Network Coding,’’ in Proc. Net Cod, Riva
[2] S. Singh, C. Raghavendra, and J. Stepanek, del Garda, Italy, Apr. 2005.
‘‘Po wer-A ware Broadcasting in Mobile Ad Hoc
[13] T. Ho, M . Me´dard, R. Koetter, D.R. Karger, M.
Networks,’’ in Proc. IEEE PIM RC, 1999, pp. 1-
Effros, J. Sh i, and B. Leong, ‘‘A Random Linear
10.
Network Coding Approach to Multicast,’’ IEEE
[3] J. Wieselthier, G. Nguyen, and A. Ephremides, Trans. Inf. Theory, vol. 52, no. 10, pp. 4413-
‘‘Algorithms for Energy-Efficient Multicasting 4430, Oct. 2006.
in Static Ad Hoc Wireless Networks,’’ Mobile
[14] C.E. Shannon, ‘‘Co mmunicat ion Theory of
Netw. Appl., vol. 6, no. 3, pp. 251-263, June
Secrecy Systems,’’ Bell Syst. Tech. J., vol. 28,
2001.
no. 4, pp. 656-715, Oct. 1949.
[4] B. Chen, K. Jamieson, H. Balakrishnan, and R.
[15] A. Menezes, P. van Oorschot, and S. Vanstone,
Morris, ‘‘Span: An Energy-Efficient
Handbook of Applied Cryptography. Boca Raton,
Coordination Algorith m for Topology
Maintenance in Ad Hoc Wireless Networks,’’ FL, USA: CRC Press, Oct. 1996.
Wireless Netw., vol. 8, no. 5, pp. 481-494, Sept. [16] N. Cai and R.W. Yeung, ‘‘Secure Netwo rk
2002. Coding,’’ in Proc. IEEE ISIT, June 2002, pp.
[5] R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. 323-329.
Yeung, ‘‘Network Information Flow,’’ IEEE

ISSN: 2347-8578 www.ijcstjournal.org Page 74


International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
[17] A. Dimovski and D. Gligoroski, ‘‘Attacks on the [29] J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu,
Transposition Ciphers using Optimization ‘‘Optimal Linear Net work Coding Design for
Heuristics,’’ in Proc. Int’l Sci. Conf. In f., Secure Unicast with Multiple Streams,’’ in Proc.
Co mmun. Energy Syst. Technol., Oct. 2003, pp. IEEE INFOCOM, Mar. 2010, pp. 1-9.
1-4.
[30] J. Benaloh, ‘‘Dense Probabilistic Encryption,’’ in
[18] C. Gkantsidis and P. Rodriguez, ‘‘Netwo rk Proc. Workshop Sel. Areas Cryptogr., Aug. 1994,
Coding for Large Scale File Distribution,’’ in pp. 120-128.
Proc. IEEE INFOCOM, Mar. 2005, pp. 2235-
[31] A.-F. Chan, ‘‘Distributed Symmetric Key
2245.
Management for Mobile Ad Hoc Networks,’’ in
[19] J. Daemen and V. Rijmen, The Design of Proc. IEEE INFOCOM, 2004, pp. 2414-2424.
Rijndael: A ES-The Advanced Encryption
[32] J.V.D. Merwe, D. Dawoud, and S. McDonald,
Standard. Berlin, Germany: Springer-Verlag,
‘‘A Survey on Peerto- Peer Key Management for
2002.
Mobile Ad Hoc Networks,’’ A CM Co mput.
[20] L.C. Washington and W. Trappe, Introduction to Surveys, vol. 39, no. 1, pp. 3-45, 2007.
Cryptography: With Cod ing Theory. Upper
[33] M. Wang and B. Li, ‘‘R2: Random Push with
Saddle River, NJ, USA: Prentice-Hall, 2002.
Random Net work Coding in Live Peer -to-Peer
[21] J. Giddy and R. Safavi-Naini, ‘‘Automated Streaming,’’ IEEE J. Sel. Areas Co mmun., vol.
Cryptanalysis of Transposition Ciphers,’’ 25, no. 9, pp. 1655-1666, Dec. 2007.
Comput. J., vol. 37, no. 5, pp. 429-436, 1994.
[34] Y. Hu, H.C. Chen, P.P. Lee, and Y. Tang,
[22] M.D. Russell, J.A. Clark, and S. Stepney, ‘‘NCCloud: Applying Network Coding for the
‘‘Making the Most of Two Heuristics : Breaking Storage Repair in a Cloud-Of-Clouds,’’ in Proc.
Transposition Ciphers with Ants,’’ in Proc. USENIX FAST, 2012, p. 21.
Congr. Evol. Comput., 2003, pp. 2653-2658.
[35] S. Ross, Introduction to Probability Models, 9th
[23] P. Paillier, ‘‘Public-Key Cryptosystems based on ed., New York, NY, USA: Academic, 2007.
Co mposite Degree Residuocity Classes,’’ in Proc.
EUROCRYPT, May 1999, pp. 233-238.
[24] The OpenSSL project. [On line]. Availab le:
http://www.openssl.org/

[25] D.W. Carman, P.S. Kruus, and B.J. Matt,


‘‘Constraints and approaches for distributed
sensor network security (Final),’’ NAI Labs,
Glenwood, MD, USA, DARPA Proj. Rep., 2000.
[26] K. Aoki and H. Lip maa, ‘‘Fast Imp lementations
of A ES Candidates,’’ in Proc. 3rd A ES
Candidate Conf., 2000, pp. 13-14.

[27] [27] M. C ˇ agalj, J. Hubaux, and C. En z,


‘‘Min imu m-Energy Broadcast in All-Wireless
Networks: Np-Co mp leteness and Distribution
Issues,’’ in Proc. A CM MobiCo m, 2002, pp.
172-182.
[28] [28] L. Lima, M. Me´dard, and J. Barros,
‘‘Random Linear Network Coding : A Free
Cypher?,’’ in Proc. IEEE ISIT, June 2007, pp.
546-550.

ISSN: 2347-8578 www.ijcstjournal.org Page 75

Você também pode gostar