Title :
d-key dynamic encryption - A security enhancement protocol for Mobile Ad Hoc Network
Author :
Yu, Peter H. ; Pooch, Udo W.
Author_Institution :
Dept. of Comput. Sci. & Eng., Texas A&M Univ., College Station, TX, USA
Abstract :
In this paper, we present an efficient, low-bandwidth cost and security-enhancing data encryption d-key protocol via dynamic re-keying during end-to-end communication. Unlike others, the secret d-key is generated using the previous data as the seed and as next packet encryption; therefore, only valid sender and receiver are able to decrypt the cipher text using the unique d-key in their possession, which prevents sensitive data from being access by unauthorized recipients. In addition, test results indicate d-key protocol can perform as efficiently as a non-security routing protocol while providing stronger data privacy with low computational overhead in data encryption and decryption.
Keywords :
ad hoc networks; cryptographic protocols; mobile radio; routing protocols; telecommunication security; d-key dynamic encryption algorithm; data encryption; data privacy; decryption algorithm; end-to-end communication; mobile ad hoc network; routing protocol; security enhancement protocol; Access protocols; Costs; Cryptography; Data privacy; Data security; Mobile ad hoc networks; Mobile communication; Performance evaluation; Routing protocols; Testing; Mobile ad hoc network; dynamic data encryption and network security;
Conference_Titel :
Ubiquitous and Future Networks, 2009. ICUFN 2009. First International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-4215-7
Electronic_ISBN :
978-1-4244-4216-4
DOI :
10.1109/ICUFN.2009.5174308