A Methodology on cryptography and Stegnography Applicant to Mobile Adhoc Network & Wireless Sensor Network
Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 1)Publication Date: 2013-06-15
Authors : Pawiterjit Kaur; Sanjeev Dhiman; Kawaljeet Kaur;
Page : 48-54
Keywords : Stegano Object; cryptanalysis; cipher text; MANET; WSN.;
Abstract
Cryptography and steganography are the two popular methods available to provide security. One hides the existence of the message and the other distorts the message itself. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper focuses on the strength of combining cryptography and stegnography methods to enhance the security of communication over an open channel.Some security research in Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have been designed based on cryptographic techniques, such as public key infrastructures and identity-based cryptography. In fact, some of them are fully adapted to fit the network requirements on limited resources such as storage, CPU, and power limitations. For example, one way hash functions are used to construct disposable secret keys instead of choosing private key in public key infrastructure. To gain a quick understanding of security design, we provide a survey on cryptography applications to secure MANETs and WSNs. Through this survey, we present network security schemes and protocols according to cryptographic techniques, give a few case studies on popular techniques of cryptography application, and dissect one of the designs using cryptographic techniques.?
Other Latest Articles
- The yield of spring barley depending on fertilizers and retardant protection on typical chernozem
- The analysis of symmetric cryptographic algorithms of data from the point of view of a possibility of their polymorphic implementation
- Next Generation Firewall in Modern Network Security
- Security issues in MANET and Counter-Measures
- A New Security Architecture for Privacy-Preserving Aggregation and Access Control in Smart Grids
Last modified: 2016-07-02 18:02:25