Kuo-Tsang Huang; Yi-Nan Lin; Jung-Hui Chiu
April 2013
International Journal of Wireless & Mobile Networks;Apr2013, Vol. 5 Issue 2, p127
Academic Journal
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion because it encrypts each block independently. To compensate for this, each block of the encrypted information should be encrypted dependently. The encrypted information should be operated with a special mode. The operation mode should be changed. This paper analysis what an operational mode of block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode technique that extends the existing mode changing opportunity. The new change operation mode technique considers the sign differences between the intra-feedback information and the public-feedback information, and then adaptively determines the corresponding change operation mode factor for each data block. This mode hopping technique for mobile streaming security is highly suitable for recent block computing in future various environments.


Related Articles

  • An Encryption Algorithm for End-to-End Secure Data Transmission in MANET. Rayarikar, Rohan; Bokil, Ajinkya // International Journal of Computer Applications;10/15/2012, Vol. 56, p29 

    Encryption is of prime importance when confidential data is transmitted over wireless network. Numerous encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used...

  • Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms. Krishna, B. Ananda; Radha, S.; Keshava Reddy, K. Chenna // Journal of Applied Sciences;2007, Vol. 7 Issue 24, p4007 

    Ad hoc networks are a new wireless networking paradigm fox mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive...

  • A CRT based Encryption Methodology for Secure Communication in MANET. Sinha, Ditipriya; Bhattacharya, Uma; Chaki, Rituparna // International Journal of Computer Applications;Feb2012, Vol. 39, p20 

    MANETs are well known for their flexibility and ease of communication. The communication is purely based on trust, without any need of authentication. This often leads to insecure communication, causing information tampering. The traditional means of security are not sufficient to safeguard...

  • Security Assessment for Key Management in Mobile Ad Hoc Networks. Abouhogail, Reham Abdellatif // International Journal of Security & Its Applications;2014, Vol. 8 Issue 1, p169 

    A mobile ad hoc network (MANET) is a kind of wireless communication system that doesn't have base stations or routers. The wireless connections can be a standard Wi-Fi connection or satellite, or another medium such as a cellular transmission. Specific applications like military or public...

  • Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. Peter Hyun-Jeen Lee; Parampalli, Udaya; Narayan, Shivaramakrishnan // Journal of Networks;Oct2009, Vol. 4 Issue 8, p687 

    Establishing secure communication in a wireless network such as Mobile Ad Hoc Network is particularly challenging because: (i) the network is self-organizing; (ii) messages are broadcasted; (iii) messages travel in a hopby- hop manner; (iv) nodes are constrained in terms of computation and...

  • SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST. Chowdhury, Chandreyee; Neogy, Sarmistha // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p259 

    The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the...

  • SECURE KEY EXCHANGE AND ENCRYPTION MECHANISM FOR GROUP COMMUNICATION IN WIRELESS AD HOC NETWORKS. Sumathy, S.; Kumar, B. Upendra // International Journal on Applications of Graph Theory in Wireles;Mar2010, Vol. 2 Issue 1, p9 

    Secured communication in ad hoc wireless networks is primarily important, because the communication signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and...

  • A Trust-Based Cross-Layer Security Protocol for Mobile Ad hoc Networks. Rajaram, A.; Palaniswami, S. // Computer Science & Telecommunications;2009, Vol. 2009 Issue 6, p124 

    In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and...

  • An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks. Ahmed, Firoz; Hoon Oh // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p1 

    A black hole attack is one of the most serious attacks in mobile ad hoc networks. A malicious node can act as if it has a valid route to a destination and then respond with a false Route Reply (RREP) message to the source, when it receives a Route Request (RREQ). Then the malicious node absorbs...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics