Performance Based Comparison Study of RSA and Chaotic Maps in MANET

International Journal of Electrical and Electronics Engineering
© 2017 by SSRG - IJEEE Journal
Volume 4 Issue 2
Year of Publication : 2017
Authors : ZebaNaaz, Kauser Fatima, C.Atheeq
pdf
How to Cite?

ZebaNaaz, Kauser Fatima, C.Atheeq, "Performance Based Comparison Study of RSA and Chaotic Maps in MANET," SSRG International Journal of Electrical and Electronics Engineering, vol. 4,  no. 2, pp. 17-22, 2017. Crossref, https://doi.org/10.14445/23488379/IJEEE-V4I2P104

Abstract:

Mobile ad hoc networks consist of mobile nodes that communicate with one another through radio communication channel. As MANETs are dynamic nature, mobile nodes enters and leaves the MANETs region at any time so there is possibility that the malicious nodes may also involve in the communication process. So MANETs need a security mechanism to have secure communication from attackers as they are vulnerable to security attacks. Different security mechanisms have been designed to solve the security issues via cryptographic techniques. However, these security mechanisms should not have much overhead on network, particularly in constrained resource environment such as Mobile Ad hoc Networks. This work compares the performance overhead of cryptographic techniques such as Chaotic Maps based & RSA based key agreement in MANETs environment. Performance results shows that RSA is considered to be most used in cryptographic techniques but its overhead of time complexity is greater than the Chaotic Maps based cryptography technique. This overhead greatly impact on end to end delay in intended communication. However, Chaotic Maps based cryptography technique is well alternative to RSA with better performance in terms of minimum computational load and lesser key generation time.

Keywords:

MANETs, Security, Authentication, RSA, Chaotic Maps.

References:

  [1] Kumar, R., Misra, M. and Sarje, A.K., 2007, December. An efficient gateway discovery in ad hoc networks for internet connectivity. In Conference on Computational Intelligence and Multimedia Applications, 2007. International Conference on (Vol. 4, pp. 275-282). IEEE.
[2] Wakikawa, R., 2002. Global connectivity for IPv6 mobile ad hoc networks. Internet-Draft, draft-wakikawa-manetglobalv6- 02. txt.
[3] Manoharan, R. and Mohanalakshmie, S., 2011, June. A trust based gateway selection scheme for integration of MANET with Internet. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 543-548). IEEE.
[4] Mohammad, A.A.K., Mirza, A. and Vemuru, S., 2016. Analytical Model for Evaluating the Bottleneck Node in MANETs. Indian Journal of Science and Technology, 9(31).
[5] Atheeq, C. and Rabbani, M.M.A., 2016. Secure Data Transmission in Integrated Internet MANETs Based onEffective Trusted Knowledge Algorithm. Indian Journal of Science and Technology, 8(1).
[6] C.Atheeq, M.MunirahamedRabbani “Effective cluster key mechanism for integrated internet MANETs ” International journal of applied engineering research vol.10 No.44, 2015
[7] Siddiqua, A., Sridevi, K. and Mohammed, A.A.K., 2015, January. Preventing black hole attacks in MANETs using secure knowledge algorithm. In Signal Processing And Communication Engineering Systems (SPACES), 2015 International Conference on (pp. 421-425). IEEE.
[8] Sana, A.B., Iqbal, F. and Mohammad, A.A.K., 2015, January. Quality of service routing for multipath manets. In Signal Processing And Communication Engineering Systems (SPACES), 2015 International Conference on (pp. 426-431). IEEE.
[9] Mohammad, A.A.K., Mirza, A. and Razzak, M.A., 2015. Reactive Energy Aware Routing Selection Based on Knapsack Algorithm (RER-SK). In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 289-298). Springer International Publishing..
[10] Mohammad, A.A.K., Mirza, A. and Vemuru, S., 2016. Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks. Indian Journal of Science and Technology, 9(26).
[11] Mohammad, A.A.K. and Atheeq, C., MUTUAL AUTHENTICATED KEY AGREEMENT SCHEME FOR INTEGRATED INTERNET MANETS
[12] Mohammad, A.A.K., Mirza, A. and Vemuru, S., 2016. Energy Aware Routing For Manets Based On Current Processing State Of Nodes. Journal of Theoretical and Applied Information Technology, 91(2), p.340.