Open Access Open Access  Restricted Access Subscription Access

Quantum based Cryptography for Secured Data Communication in Mobile Ad-Hoc Network


Affiliations
1 Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu, India
 

A Mobile Ad-Hoc Network (MANET) is an infrastructure-less network of mobile devices that are linked without any wire. Every mobile device in MANET moves in any direction. Security is a key problem in MANET of providing the secured communication with routing and packet forwarding process. In order to improve the security during the data communication, Quantum Key Distribution based Secured Data Communication (QKD-SDC) technique is designed in MANET. In QKD-SDC technique, quantum based cryptography used the quantum mechanics for secured data communication. Initially, Quantum based Cryptography performs Quantum Key Generation and Quantum Key distribution process. In Quantum Key Generation process, quantum key is generated and the key is shared to the receiver. With help of the quantum key, the original data gets encrypted as qubits. In Quantum Key distribution process, the qubits are sent to the receiver end through quantum communication channel along with the quantum key. At the receiver end, when the quantum key gets matched with receiver's quantum key, the qubits are decrypted to obtain the original data. When the key is not matched, the qubits get dropped. This in turn helps to improve the secured data communication in quantum communication channel. Experimental evaluation of QKD-SDC technique is carried out with the performance metrics such as data loss rate, throughput and time for secured data delivery. Experimental analysis shows that the QKD-SDC technique is able to reduce the data loss rate and also improves the throughput when compared to the state-of-the-art works.

Keywords

Mobile Ad-Hoc Network (manet), Quantum Key Generation Process, Quantum Key Distribution Process, Quantum Communication Channel, Secured Data Communication.
User
Notifications
Font Size


  • Wang N, Zhang N, Gulliver TA. Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Transactions on Information Forensics and Security. 2014; 9(2):272–84. https://doi.org/10.1109/ TIFS.2013.2293113
  • Ning H, Liu H, Yang LT. Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Transactions on Parallel and Distributed Systems. 2015 Mar; 26(3):657–67. https://doi.org/10.1109/TPDS.2014.2311791
  • Sangeetha S, Sathappan S. Securing data retrieval based on tree indexed self organized key in mobile ad- hoc network. IEEE Computation System and Information Technology for Sustainable Solutions (CSITSS). 2016 Dec; 11(2):191–4. https://doi.org/10.1109/csitss.2016.7779412
  • Bhosle A, Pandey Y. Applying security to data using symmetric encryption in MANET. International Journal of Emerging Technology and Advanced Engineering. 2013 Jan; 3(1):426–30
  • Yang S, Yeo CK, Lee BS. Toward reliable data delivery for highly dynamic mobile ad-hoc networks. IEEE Transactions on Mobile Computing. 2012 Jan; 11(1):111–24. https://doi.org/10.1109/TMC.2011.55
  • Patwari N, Croft J, Jana S, Kasera SK. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing. 2010 Jan; 9(1):17–30. https://doi.org/10.1109/ TMC.2009.88
  • Papadimitratos P, Haas ZJ. Secure data transmission in mobile ad-hoc networks. WiSe ‘03 Proceedings of the 2nd ACM Workshop on Wireless security; 2003. p. 41–50. https://doi.org/10.1145/941311.941318
  • Gunasekaran M, Premalatha K. SPAWN: A secure privacypreserving architecture in wireless mobile ad-hoc networks. Springer, EURASIP Journal on Wireless Communications and Networking. 2013 Sep; 2013:1–12. https://doi.org/10.1186/1687-1499-2013-220
  • Singh R, Singh P, Duhan M. An effective implementation of security based algorithmic approach in mobile ad-hoc networks. Springer, Human-Centric Computing and Information Sciences. 2014 Dec; 4(7):1–14.
  • Abdelhaq M, Alsaqour R, Abdelhaq S. Securing mobile adhoc networks using danger theory-based artificial immune algorithm. PLoS ONE. 2015 May; 10(5):1–16. https://doi.org/10.1371/journal.pone.0120715
  • Borkar GM, Mahajan AR. A secure and trust based ondemand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Networks, Springer. 2016 May; 1–18.
  • Ghosh U, Datta R. A secure addressing scheme for large scale managed MANETs. IEEE Transactions on Network and Service Management. 2015; 12(3):483–95. https://doi.org/10.1109/TNSM.2015.2452292
  • Saha HN, Bhattacharyya D, Banerjee PK. Modified Fidelity Based On-Demand Secure (MFBOD) routing protocol in mobile ad-hoc network. International Journal of Foundations of Computing and Decision Sciences (FCDS), De Grurter. 2015 Dec; 40(4):267–98.
  • Sarkar S, Dattab R. A secure and energy-efficient stochastic multipath routing for self-organized mobile ad-hoc networks. Ad-hoc Networks, Elsevier. 2016 Feb; 37(P2):209–27. https://doi.org/10.1016/j.adhoc.2015.08.020
  • Alnumay WS, Ghos U. Secure routing and data transmission in mobile ad-hoc networks. International Journal of Computer Networks and Communications (IJCNC); 2014 Jan; 6(1):111–27. https://doi.org/10.5121/ijcnc.2014.6108
  • Di Pietro R, Guarino S, Verde NV, Domingo-Ferrer J. Security in wireless ad-hoc networks – A survey. Computer Communications, Elsevier. 2014 Sep; 51:1–20. https://doi.org/10.1016/j.comcom.2014.06.003
  • Katiravan J, Sylvia D, Rao DS. Energy efficient link aware routing with power control in wireless ad-hoc networks. The Scientific World Journal. 2015; 2015:1–7. PMid:26167529 PMCid:PMC4475759. https://doi.org/10.1155/2015/576754
  • Bose D, Banerjee A, Bhattacharyya A, Saha HN, Bhattacharyya D, Banerjee PK. An efficient approach to secure routing in MANET. Advances in Computing and Information Technology, Springer. 765–76. https://doi.org/10.1007/978-3-642-31513-8_78
  • Sherin Z, Soni MK. Secure routing in MANET through crypt-biometric technique. International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA); 2014. p. 713–20.
  • Liu W, Yu M. AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology. 2014; 63(9):4585– 93. https://doi.org/10.1109/TVT.2014.2313180
  • Aluvala S, Sekhar KR, Vodnala D. A novel technique for node authentication in mobile ad-hoc networks. Perspectives in Science, Elsevier. 2016; 8:680–2. https://doi.org/10.1016/j.pisc.2016.06.057

Abstract Views: 463

PDF Views: 333




  • Quantum based Cryptography for Secured Data Communication in Mobile Ad-Hoc Network

Abstract Views: 463  |  PDF Views: 333

Authors

S. Sangeetha
Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu, India
S. Sathappan
Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu, India

Abstract


A Mobile Ad-Hoc Network (MANET) is an infrastructure-less network of mobile devices that are linked without any wire. Every mobile device in MANET moves in any direction. Security is a key problem in MANET of providing the secured communication with routing and packet forwarding process. In order to improve the security during the data communication, Quantum Key Distribution based Secured Data Communication (QKD-SDC) technique is designed in MANET. In QKD-SDC technique, quantum based cryptography used the quantum mechanics for secured data communication. Initially, Quantum based Cryptography performs Quantum Key Generation and Quantum Key distribution process. In Quantum Key Generation process, quantum key is generated and the key is shared to the receiver. With help of the quantum key, the original data gets encrypted as qubits. In Quantum Key distribution process, the qubits are sent to the receiver end through quantum communication channel along with the quantum key. At the receiver end, when the quantum key gets matched with receiver's quantum key, the qubits are decrypted to obtain the original data. When the key is not matched, the qubits get dropped. This in turn helps to improve the secured data communication in quantum communication channel. Experimental evaluation of QKD-SDC technique is carried out with the performance metrics such as data loss rate, throughput and time for secured data delivery. Experimental analysis shows that the QKD-SDC technique is able to reduce the data loss rate and also improves the throughput when compared to the state-of-the-art works.

Keywords


Mobile Ad-Hoc Network (manet), Quantum Key Generation Process, Quantum Key Distribution Process, Quantum Communication Channel, Secured Data Communication.

References





DOI: https://doi.org/10.15613/sijrs%2F2016%2Fv3i2%2F157299