DocumentCode :
2026831
Title :
Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs
Author :
Ravilla, Dilli ; Putta, Chandra Shekar Reddy
Author_Institution :
Dept. of ECE, Manipal Univ., Manipal, India
fYear :
2015
fDate :
29-30 Jan. 2015
Firstpage :
154
Lastpage :
159
Abstract :
The purpose of a hash function is to produce a "fingerprint" of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.
Keywords :
cryptography; data integrity; message authentication; mobile ad hoc networks; routing protocols; telecommunication security; DES; HMAC-SHA256 algorithm; MAC; MANET; brute-force attacks; cryptographic hash functions; data encryption standard; data integrity; hash code length; hybrid routing protocols; message authentication codes; mobile ad hoc networks; mobile network environment; network end-to-end delays; network simulator 2; packet delivery ration; throughput calculation; Ad hoc networks; Authentication; Cryptography; Delays; Message authentication; Protocols; Cryptographic Hash function; Data Encryption Standard (DES); Data Integrity; Message Authentication Code (MAC); Network Simulator; Packet Delivery ratio;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronic Design, Computer Networks & Automated Verification (EDCAV), 2015 International Conference on
Conference_Location :
Shillong
Print_ISBN :
978-1-4799-6207-5
Type :
conf
DOI :
10.1109/EDCAV.2015.7060558
Filename :
7060558
Link To Document :
بازگشت