DocumentCode :
1999030
Title :
Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks
Author :
Ren, Yonglin ; Boukerche, Azzedine ; Pazz, Richard Werner Nelem
Author_Institution :
PARADISE Res. Lab., Univ. of Ottawa Ottawa, Ottawa, ON, Canada
fYear :
2010
fDate :
6-10 Dec. 2010
Firstpage :
1
Lastpage :
5
Abstract :
Though wireless networks provide great convenience to mobile users, they also give rise to non-trivial concerns about the security due to open channels and flexible mobility. An important concern is the securing of a communication link between any pair of nodes. Here, data encryption is deemed the primary solution to protect data confidentiality and integrity. However, the issue of traditional cryptographic techniques´ application in wireless and mobile networks is significant to improve the performance of networks. In this article, we propose a hybrid encryption algorithm to deal with the applications of symmetric key and asymmetric key in wireless ad hoc networks. In particular, a public key is used as an authentication method to validate the identity of a legitimate node and to prevent unwanted parties from obtaining unauthorized data and resources. Our performance comparison shows that our proposed schemes have reasonable computational costs and communication overhead, provide reliable security, and at the same time, improve the efficiency of cryptographic techniques. In this way, our simulation results indicate that our algorithm is effective and practical for the data protection in wireless and mobile networks.
Keywords :
data integrity; message authentication; mobile ad hoc networks; mobility management (mobile radio); performance evaluation; public key cryptography; telecommunication security; authentication; communication overhead; cryptographic technique; data confidentiality; data encryption; data integrity; data protection; flexible mobility; hybrid cryptosystem; hybrid encryption algorithm; mobile network; mobile user; performance evaluation; public key; reliable security; secure communication link; unauthorized data; wireless ad hoc network; Ad hoc networks; Authentication; Encryption; Mobile computing; Peer to peer computing; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location :
Miami, FL
ISSN :
1930-529X
Print_ISBN :
978-1-4244-5636-9
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2010.5684001
Filename :
5684001
Link To Document :
بازگشت