Quantum based Cryptography for Secured Data Communication in Mobile Ad-Hoc Network

Jump To References Section

Authors

  • Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu ,IN
  • Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu ,IN

DOI:

https://doi.org/10.15613/sijrs/2016/v3i2/157299

Keywords:

Mobile Ad-Hoc Network (manet), Quantum Key Generation Process, Quantum Key Distribution Process, Quantum Communication Channel, Secured Data Communication.

Abstract

A Mobile Ad-Hoc Network (MANET) is an infrastructure-less network of mobile devices that are linked without any wire. Every mobile device in MANET moves in any direction. Security is a key problem in MANET of providing the secured communication with routing and packet forwarding process. In order to improve the security during the data communication, Quantum Key Distribution based Secured Data Communication (QKD-SDC) technique is designed in MANET. In QKD-SDC technique, quantum based cryptography used the quantum mechanics for secured data communication. Initially, Quantum based Cryptography performs Quantum Key Generation and Quantum Key distribution process. In Quantum Key Generation process, quantum key is generated and the key is shared to the receiver. With help of the quantum key, the original data gets encrypted as qubits. In Quantum Key distribution process, the qubits are sent to the receiver end through quantum communication channel along with the quantum key. At the receiver end, when the quantum key gets matched with receiver's quantum key, the qubits are decrypted to obtain the original data. When the key is not matched, the qubits get dropped. This in turn helps to improve the secured data communication in quantum communication channel. Experimental evaluation of QKD-SDC technique is carried out with the performance metrics such as data loss rate, throughput and time for secured data delivery. Experimental analysis shows that the QKD-SDC technique is able to reduce the data loss rate and also improves the throughput when compared to the state-of-the-art works.

Downloads

Published

2016-12-01

Issue

Section

Computer Science

 

References

Wang N, Zhang N, Gulliver TA. Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Transactions on Information Forensics and Security. 2014; 9(2):272–84. https://doi.org/10.1109/ TIFS.2013.2293113

Ning H, Liu H, Yang LT. Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Transactions on Parallel and Distributed Systems. 2015 Mar; 26(3):657–67. https://doi.org/10.1109/TPDS.2014.2311791

Sangeetha S, Sathappan S. Securing data retrieval based on tree indexed self organized key in mobile ad- hoc network. IEEE Computation System and Information Technology for Sustainable Solutions (CSITSS). 2016 Dec; 11(2):191–4. https://doi.org/10.1109/csitss.2016.7779412

Bhosle A, Pandey Y. Applying security to data using symmetric encryption in MANET. International Journal of Emerging Technology and Advanced Engineering. 2013 Jan; 3(1):426–30

Yang S, Yeo CK, Lee BS. Toward reliable data delivery for highly dynamic mobile ad-hoc networks. IEEE Transactions on Mobile Computing. 2012 Jan; 11(1):111–24. https://doi.org/10.1109/TMC.2011.55

Patwari N, Croft J, Jana S, Kasera SK. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing. 2010 Jan; 9(1):17–30. https://doi.org/10.1109/ TMC.2009.88

Papadimitratos P, Haas ZJ. Secure data transmission in mobile ad-hoc networks. WiSe ‘03 Proceedings of the 2nd ACM Workshop on Wireless security; 2003. p. 41–50. https://doi.org/10.1145/941311.941318

Gunasekaran M, Premalatha K. SPAWN: A secure privacypreserving architecture in wireless mobile ad-hoc networks. Springer, EURASIP Journal on Wireless Communications and Networking. 2013 Sep; 2013:1–12. https://doi.org/10.1186/1687-1499-2013-220

Singh R, Singh P, Duhan M. An effective implementation of security based algorithmic approach in mobile ad-hoc networks. Springer, Human-Centric Computing and Information Sciences. 2014 Dec; 4(7):1–14.

Abdelhaq M, Alsaqour R, Abdelhaq S. Securing mobile adhoc networks using danger theory-based artificial immune algorithm. PLoS ONE. 2015 May; 10(5):1–16. https://doi.org/10.1371/journal.pone.0120715

Borkar GM, Mahajan AR. A secure and trust based ondemand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Networks, Springer. 2016 May; 1–18.

Ghosh U, Datta R. A secure addressing scheme for large scale managed MANETs. IEEE Transactions on Network and Service Management. 2015; 12(3):483–95. https://doi.org/10.1109/TNSM.2015.2452292

Saha HN, Bhattacharyya D, Banerjee PK. Modified Fidelity Based On-Demand Secure (MFBOD) routing protocol in mobile ad-hoc network. International Journal of Foundations of Computing and Decision Sciences (FCDS), De Grurter. 2015 Dec; 40(4):267–98.

Sarkar S, Dattab R. A secure and energy-efficient stochastic multipath routing for self-organized mobile ad-hoc networks. Ad-hoc Networks, Elsevier. 2016 Feb; 37(P2):209–27. https://doi.org/10.1016/j.adhoc.2015.08.020

Alnumay WS, Ghos U. Secure routing and data transmission in mobile ad-hoc networks. International Journal of Computer Networks and Communications (IJCNC); 2014 Jan; 6(1):111–27. https://doi.org/10.5121/ijcnc.2014.6108

Di Pietro R, Guarino S, Verde NV, Domingo-Ferrer J. Security in wireless ad-hoc networks – A survey. Computer Communications, Elsevier. 2014 Sep; 51:1–20. https://doi.org/10.1016/j.comcom.2014.06.003

Katiravan J, Sylvia D, Rao DS. Energy efficient link aware routing with power control in wireless ad-hoc networks. The Scientific World Journal. 2015; 2015:1–7. PMid:26167529 PMCid:PMC4475759. https://doi.org/10.1155/2015/576754

Bose D, Banerjee A, Bhattacharyya A, Saha HN, Bhattacharyya D, Banerjee PK. An efficient approach to secure routing in MANET. Advances in Computing and Information Technology, Springer. 765–76. https://doi.org/10.1007/978-3-642-31513-8_78

Sherin Z, Soni MK. Secure routing in MANET through crypt-biometric technique. International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA); 2014. p. 713–20.

Liu W, Yu M. AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology. 2014; 63(9):4585– 93. https://doi.org/10.1109/TVT.2014.2313180

Aluvala S, Sekhar KR, Vodnala D. A novel technique for node authentication in mobile ad-hoc networks. Perspectives in Science, Elsevier. 2016; 8:680–2. https://doi.org/10.1016/j.pisc.2016.06.057