• DocumentCode
    1999030
  • Title

    Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks

  • Author

    Ren, Yonglin ; Boukerche, Azzedine ; Pazz, Richard Werner Nelem

  • Author_Institution
    PARADISE Res. Lab., Univ. of Ottawa Ottawa, Ottawa, ON, Canada
  • fYear
    2010
  • fDate
    6-10 Dec. 2010
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Though wireless networks provide great convenience to mobile users, they also give rise to non-trivial concerns about the security due to open channels and flexible mobility. An important concern is the securing of a communication link between any pair of nodes. Here, data encryption is deemed the primary solution to protect data confidentiality and integrity. However, the issue of traditional cryptographic techniques´ application in wireless and mobile networks is significant to improve the performance of networks. In this article, we propose a hybrid encryption algorithm to deal with the applications of symmetric key and asymmetric key in wireless ad hoc networks. In particular, a public key is used as an authentication method to validate the identity of a legitimate node and to prevent unwanted parties from obtaining unauthorized data and resources. Our performance comparison shows that our proposed schemes have reasonable computational costs and communication overhead, provide reliable security, and at the same time, improve the efficiency of cryptographic techniques. In this way, our simulation results indicate that our algorithm is effective and practical for the data protection in wireless and mobile networks.
  • Keywords
    data integrity; message authentication; mobile ad hoc networks; mobility management (mobile radio); performance evaluation; public key cryptography; telecommunication security; authentication; communication overhead; cryptographic technique; data confidentiality; data encryption; data integrity; data protection; flexible mobility; hybrid cryptosystem; hybrid encryption algorithm; mobile network; mobile user; performance evaluation; public key; reliable security; secure communication link; unauthorized data; wireless ad hoc network; Ad hoc networks; Authentication; Encryption; Mobile computing; Peer to peer computing; Public key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
  • Conference_Location
    Miami, FL
  • ISSN
    1930-529X
  • Print_ISBN
    978-1-4244-5636-9
  • Electronic_ISBN
    1930-529X
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2010.5684001
  • Filename
    5684001