DocumentCode :
3027729
Title :
Development and validation of a NS2 protocol for data security at network layer
Author :
Kumar, Prashant ; Maheshwari, Shivangi ; Dubey, Harsh Kumar
Author_Institution :
Dept. of Comput. Sci. & Eng., Galgotias Univ., Greater Noida, India
fYear :
2015
fDate :
15-16 May 2015
Firstpage :
529
Lastpage :
534
Abstract :
NS2 is an event-driven, object-oriented simulation tool to simulate and analyze dynamic nature of communication networks; it is also a powerful tool to develop new protocols and functions. NS-2 is an open source and very popular network simulation tool. It provides support for OSI or TCP/IP protocols stack and many standard routing and application protocols for wire and wireless networks. In NS2, many protocols have been implemented so far at various layer of TCP/IP protocol suite to provide different functions, but none provides security functions. Although, some applications require security (Encryption/Decryption and key exchange) implementation in NS-2. However, NS-2 does not provide these features till now. In this paper, we solve this issue by adding new security module or protocol in NS2. Security module helps us in key sharing as well as in implementation of encryption/decryption functions. We analyze the features of a security module in details; discuss the algorithms used, simulation process and implementation of a security module on the basis of NS2. Also, the simulation details of key sharing protocol and self-defined encryption/decryption protocol in wired network are introduced. NAM is used to display the process of simulation. The purpose of the module is to introduce encryption/decryption features with key sharing into network simulation program.
Keywords :
cryptography; data communication; radio networks; routing protocols; telecommunication security; transport protocols; NAM; NS2 protocol; OSI; TCP/IP protocols; data security; encryption/decryption functions; key exchange; network layer; network simulation program; object-oriented simulation tool; security module; standard routing; wireless networks; Analytical models; Ciphers; Encryption; Protocols; Receivers; Deffie-Hellman Algorithm; Encryption/Decryption; Key Sharing; NS2; Security at Network Layer; Symmetric Key Cryptography; Transpositional cipher;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Communication & Automation (ICCCA), 2015 International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-8889-1
Type :
conf
DOI :
10.1109/CCAA.2015.7148434
Filename :
7148434
Link To Document :
بازگشت