ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Methodology on cryptography and Stegnography Applicant to Mobile Adhoc Network & Wireless Sensor Network

Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 1)

Publication Date:

Authors : ; ; ;

Page : 48-54

Keywords : Stegano Object; cryptanalysis; cipher text; MANET; WSN.;

Source : Download Find it from : Google Scholarexternal

Abstract

Cryptography and steganography are the two popular methods available to provide security. One hides the existence of the message and the other distorts the message itself. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper focuses on the strength of combining cryptography and stegnography methods to enhance the security of communication over an open channel.Some security research in Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have been designed based on cryptographic techniques, such as public key infrastructures and identity-based cryptography. In fact, some of them are fully adapted to fit the network requirements on limited resources such as storage, CPU, and power limitations. For example, one way hash functions are used to construct disposable secret keys instead of choosing private key in public key infrastructure. To gain a quick understanding of security design, we provide a survey on cryptography applications to secure MANETs and WSNs. Through this survey, we present network security schemes and protocols according to cryptographic techniques, give a few case studies on popular techniques of cryptography application, and dissect one of the designs using cryptographic techniques.?

Last modified: 2016-07-02 18:02:25