SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 45
Secure communication for mobile Adhoc network using
(LPIT) Lagrange polynomial and Integral transform with
Exponential Function
Sumee Rai Nidhi Tyagi Pradeep Kumar
Student, CS Associate Professor, CS Assistant Professor, CS
Shobhit University, Shobhit University, JSSATE, UPTU
Meerut-250110 Meerut-250110 Noida-201301
Abstract—Mobile adhoc network is collection of autonomous nodes that are frequently moving without the centralized
control. Mobile adhoc networks are multi hop wireless networks without fixed infrastructure. Node frequently change
topology, due to this type of behavior transformation of information from one node to another node is more
complicated task. Decentralized nature of mobile adhoc network is more vulnerable to attack like denial of service
(DOS) which consumes more bandwidth and resources. Security is major concern in adhoc network, so in this paper,
we propose a new algorithm based on Lagrange polynomial and Laplace transform and inverse Laplace transform to
enhance secure communication for MANET. This proposed algorithm provides security for transmission of
information among node.
Keywords—Mobile adhoc network, Lagrange Interpolation, Threshold Cryptography, Modular Arithmetic, Integral
Transform
I. INTRODUCTION
Adhoc network is self-dependable infrastructure less network. Every node moves independently and communicates with
each other without the help of any central control. Connection among mobile nodes are made through waves, topology
changes dynamically during over all process of communication. Due to inherent characteristic of MANETs: open
medium, lack of centralized control, dynamic movement of node ,etc, MANETs are highly vulnerable to attacks.
Problem formulation: Main problem is highly secure communication among MANET node, so we proposed a secure
algorithm based on Lagrange Polynomial and Laplace Transform.
II. BACKGROUND
Threshold Cryptography is the way to enhance security by creating partial secret shares and distribute among a set of n
values based on node id. In a threshold cryptography scheme, out of n entities, we choose t (threshold value) entities
(t<n) and calculate secret information on the basis of polynomial function.
Quantum Cryptography (QC) depends on the uncertainty principle of quantum with which it is impossible to for
an eavesdropper to detect the data being transmitted without disturbing the transmission. This method is not based on
mathematics instead it is developed on the base of physics. The changes made by the eavesdropper will anonymously
introduce high error rate in the transmission between sender and receiver. It makes use of photons (light particles) to
generate keys. Provably secure key distribution is achieved by using two channels between sender and receiver. Public
and quantum channels are used to transmit encrypted data and key distribution respectively.
Integral transform has many applications in various fields such as Mechanics, Electrical circuit, Beam problems,
Heat conduction, Wave equation, Transmission lines, Signals and Systems, Control systems, Communication Systems,
Hydrodynamics, Solar systems. In this paper, we will discuss application of cryptography. In Shamir’s idea of identity-
based cryptosystem [3], the recipient’s identity i is used to generate the encryption key, and the decryption key is derived
from I and a random seed k. In an identity-based signature scheme, the signature key is generated from sender identity I
and a random seed k, and the verification key is derived from sender’s identity i.
Many IBC schemes [3,6] use threshold cryptography which originated from Shamir , for their key management.
Shamir gives a solution to the problem of sharing a secret among a number of users. In his paper, he identifies the
problem of how to divide data D into n pieces in such a way that D is easily reconstruct able from any t pieces, but even
complete knowledge of t − 1 pieces reveals absolutely no information about D.
In [8] a distributed pair wise key establishment scheme based on the concept of bivariate polynomials. In their
method, any mobile node in an ad hoc network can securely communicate with other nodes just by knowing their
corresponding IDs. The bivariate polynomials are shared in such a manner that the shares depend on the coefficient
matrix of the polynomial, the requesting node's ID and the ID of the nodes that respond to the request.
Identity-based cryptography specifies a cryptosystem in which both public and private keys are based on the
identities of the users.[3,6] The idea of IBC was first proposed by Shamir in 1984.[7] Such a scheme has the property that
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 46
a user’s public key is an easily calculated function of his identity, while a user’s private key can be calculated for him by
a trusted authority, called a Private Key Generator (PKG).Compared to traditional PKI, it saves storage and transmission
of public keys and certificates, which is especially attractive for devices forming MANETs. The identity based
cryptosystem [9] and shared the session key among the nodes of MANET. Identity based cryptosystem provides a new
but safe strategy for communication in MANET, Strategy uses Lagrange interpolation to share the session key among the
nodes of MANET. This paper realizes the safe communication in the MANET. Integral transformation based encryption
provide higher secure algorithm. In this process use Laplace and inverse Laplace transformation. Algorithm which makes
it suitable for embedded systems that require high performance; ease of implementation, high speed, low power
consumption and low cost beside security.
Proposed Security Architecture and Mechanism for wireless Information Transmission
The architecture and detailed mechanism is discussed in section discus below respectively.
III. SECURITY ARCHITECTURE
Figure illustrates the working architecture based on threshold cryptography, Lagrange polynomial and Integral
transformation. The proposed architecture is divided into modules like Generate session key using node id at both sender
and receiver side, encryption using Integral transformation and decryption done by inverse integral transformation
method using exponential function.
Fig. 1 Secure Architecture based on Threshold Cryptography
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 47
Fig. 1 Flow Chart for generating partial keys, Encryption and decryption
IV.KEY GENERATION, ENCRYPTION AND DECRYPTION
Step -1 Key Generation
In the first Module of key generation we explain about how we generate the session key by using threshold cryptography
and Lagrange interpolation with modularithmetic to generate session key required Minimum tTh (Threshold value) no of
node in cluster. Consider a Polynomial equation GF (p) is Finite field p>n
Choose a0, a 1 , a 2 , a k-1∈GF (p)
F(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … ..............+ a t-1 x t-1
) mod p
F(0)= a0=secret key (SK) and p is a huge prime number and a1, a2…, and ak-1 are arbitrarily chosen from Z/PZ.
Then each user of identity id is provided with it partial key
Si = f (idi). Their shares provide t distinct points (x, y) = (i, Si) calculate polynomail by using lagrange interpolation [5]
( ) =	∑ ∏ , Eq-1
Lagrange interpolation Since f (0) = a0 = S, the shared secret can be expressed as
= 	
Where
=	
−
,
Secret key is genrated by t arbitary node(minimum no of threshold node) by using F(0)=a0modp=(SK)
Step-2 Encryption Process
Introduction to the Integral Transform Method
The foundation of Integral theory is Lerch's cancellation law. The direct Integral transform or the integral of a function
f (t) defined for 0≤t <∞ is the ordinary calculus integration problem
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 48
L{f(t)}= F(s)= ∫ f(t)e-st
dt
L-1
{F(S)}=f(t)
L-1
is inverse Integral transform.
Integral transformation is linear function that satisfies following
1. L{f(t) ±g(t)}= L{f(t)} ± L{g(t)}
2. L{d1f(t) = d1L{f(t)} d1 is constant.
There are many application of Laplace transform like to solve differential equation, in physics and engineering. In this
paper we use Laplace transformation to provide the security of information during transmission from one node to another
node in mobile Adhoc network inter and intra communication.
Using exponentail function
= 1 +
1!
+
( )
2!
+
( )
3!
+ ⋯,
k any real no.Multiply both sides by x
= (1 +
1!
+
( )
2!
+
( )
3!
+ ⋯ ),
k any real no.
= 1 +
1!
+
( )
2!
+
( )
3!
+ ⋯,
k is shared key generated by LaGrange polynomial.
Let us consider plain text
( ) = = 0 1 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
…,
( ) = = ( 01 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
… ),
( ) =∑ (∞
2n
xn+1
/ !)
Taking Integral transform both side
L ( )} = { } = { ( 01 + 1
!
+ 2
( )
!
+ 3
( )
!
+ 4
( )
!
+ 5
( )
!
… ), }
L{ ( )}= + + + + … … … … … … … … … ..																								
Modular Arithmetic
Modular Arithmetic discovered by K.F. Gauss. Two numbers a and b are said to be equal or congruent modulo n iff
n|(a-b), i.e. iff their difference is exactly divisible by n. Usually a, b, are nonnegative and n a positive integer.
We write a = b (mod n).
Ci=Gi mod26 for i=0, 1, 2, 3……………………n
Ci=Gi-26difor i=0, 1, 2, 3……………………n
All di for i=0, 1, 2, 3……………n Sharable between sender and receiver .
C0, C1 ,C2 , C3 , C4 ……..Cn are Cipher text of Plain text P0, P1 , P2 ,P3, P4…………….Pn
Step-3 Decryption Process
Gi=Ci+ 26difor i=0, 1, 2, 3……………………n using di generate all Gi
L{ ( )}= + + + +
Taking inverse Laplace transforms both sides
using LaGrange interpolation generate session key and generate P0, P1 , P2 ,P3, P4……….Pn
Mechanism for secure Information transmission
The proposed mechanism is divided into main three phases as follows.
PHASE-1: Secret Key Generation using LaGrange interpolation polynomial
 Random no generator generate node id.
 Using node id Generate shared information of secret key
A B C D - - Z
0 1 2 3 - - 25
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 49
 We fixed threshold no of node id ,to regenerate secret key
 Consider a Polynomial equation GF (p) is Finite field p>n
 Choose a0, a 1 , a 2 , a k-1∈GF (p)
g(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … + a t-1 x t-1
) mod p
Total No of user=N;
for(i=0; i<t; i++)
{Id[i];
}
for(i=0; i<t; i++)
{ nr=1;
dr=1;
for(j=0; j<t; j++)
{
If(j≠i)
{
nr=nr*(x-Id[j]);
dr=dr*(Id[i])- Id[j]);
g(x)=(nr/dr)*FId[i])); /*Polynomial Equation generated by node id*/
}
Put the value of x and Generate Secrete KEY;
Sk=g(x)mod p; /*SK-Session Key*/
/*session key use for secure communication among nodes.*/
PHASE-2: Encryption
 Secret key generate from LaGrange polynomial use as key in Integral transform
 Generate secure message using Integral transform.
PHASE-3: Decryption
 Generate session key using shared partial information
 Decrypt message using inverse integral transformation.
EXAMPLE
Key Generation
Choose a0, a 1 , a 2 , a k-1∈GF (p)
F(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … ..............+ a t-1 x t-1
) mod p
a0 =2, a1, a2=1 ,a3=1
let us consider node id generated by random no generator
consider 4 node
id0=0 id1=1,id2=2,id3=3 prime no p=5,
plynomail equation
f(x)=(x3+x2-x+2)mod5
generate partial key using lagrange polynomail
f(0)=2, f(1)=3, f(2)=12, f(3)=5, these partial key send to reciver side ,reciver generate session key using these partial key.
k=f(0)=2mod5=2
Encryption Process
Let us consider plain text
MONDAY
P0=12, P1=14,P2=15,P3=3,P4=0,P5=24
( ) = = 0 1 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
…,
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 50
( ) = = ( 01 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
… ),
for k=2
( ) = = (12 + 14
1!
+ 15
( )
2!
+ 3
( )
3!
+ 0
( )
4!
+ 24
( )
5!
… ),
by using Integral transformation ,taking Integral transform both side of give equation consider k generated by Lagrange
polynomial,
L{ ( )} = { } = { 12 + 14
!
+ 15
( )
!
+ 3
( )
!
+ 0
( )
!
+ 24
( )
!
… },
for k=2
L{ ( )} = { } = { 12 + 14 !
+ 15
( )
!
+ 3
( )
!
+ 0
( )
!
+ 24
( )
!
… },
taking Integral transform both side
= + + + + +
q0=12, q1=56,q2=120,q3=136,q4=0,q5=4608
12=26(0)+12, 56=26(2)+4, 120=26(4)+22, 136=26(6)+0 , 0=26(0)+0 , 4608=26(177)+4
C0=12, C1=4, C2=22 ,C3=0, C4=0 , C5=4 are cipher text
for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 shared between sender and receiver.
messages ‘MONDAY’ converted to ‘ MEWAAD’.
Decryption Process
1. using shared partial key generate secured key
f(0)=2, f(1)=3, f(2)=12, f(3)=5,
(X0=0 , Y0=2), (X1=1 , Y1=3), (X2=2 , Y2=12) , (X3=3 , Y3=5)
( ) =	
−
−
,
	
f(x)=(x3
+x2
-x+2)mod5
f(0)=(0+0-0+2)mod5=2 ,k=2
for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177
Received message is MEWAAD
q0= 26*0+12 =12 q1=26*2+4=56 q2=26*4+22=120q3=26*6+ 0=136
q4=26*0+0=0 q5=26*177+4=4068
L{ ( )} == + + + + +
taking inverse integral transform both side using k=2
( ) = = (12 + 14
2
1!
+ 15
(2 )
2!
+ 3
(2 )
3!
+ 0
(2 )
4!
+ 24
(2 )
5!
… ),
messages ‘ MEWAAD’ converted to. ‘MONDAY’
V. CONCLUSION
This proposed algorithm is more secure because it is light weighted and in this algorithm first we secure the secret key
using Lagrange polynomial and integral transformation this higher secure method to secure key using node id in mobile
adhoc network. And after producing key we use this key for encryption and decryption that algorithm based on Laplace
transformation and modular arithmetic. Algorithm provides higher security.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 51
VI.FUTURE WORK
In this paper, a secure system for MANET is presented, which solves the problem of scalability of nodes in MANET. We
can improve the performance of the system by reducing the communication overhead among nodes.
REFERENCES
[1] M. B. Abdelhalim , M. El-Mahallawy , M. Ayyad , A. Elhennawy , Design & Implementation of an Encryption
Algorithm for use in RFID System , International Journal of RFID Security and Cryptography (IJRFIDSC), Volume
1, Issues 1/2, March/June 2012
[2 ] Mamatha.T , Network Security for MANETS International Journal of Soft Computing and Engineering (IJSCE) ,
Volume-2, Issue-2, May 2012
[3] Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai , A Survey of Applications of Identity-Based
Cryptography in Mobile Ad-Hoc Networks , IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 14,
NO. 2, SECOND QUARTER 2012
[4] Lu Li, Ze Wang, Wenju Liu and Yunlong , A Certificate less Key Management Scheme in Mobile Ad Hoc Networks
2011 IEEE
[5] A.Rajaram , Dr.S.Palaniswam, A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks ,
International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, July 2010
[6] EDUARDO DA SILVA, ALDRI L. DOS SANTOS, AND LUIZ CARLOS P. ALBINI , Identity based key
management in
mobile adhoc networks and applications, IEEE Wireless Communications • October 2008
[7] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO’84, LNCS, 1985,
[8] Anindo Mukherjee, Hongmei Deng, Dharma Agrawal , Distributed Pairwise Key Generation Using Shared
Polynomials for Wireless Ad Hoc Networks , Center of Distributed And Mobile Computing,University Of
Cincinnati, Cincinnati
[9] Li Wang, Jiu Hui Zhang “ Security Strategy of MANET Based on Identity- Based Cryptosystems” 2010 IEEE
[10] XU Xiao-long XIONG Jing-Yi, CHENG Chun-Ling “The Model and the Security Mechanism of the Information
Retrieval System based on Mobile Multi­ Agent” 2010 IEEE
[11]Derek Williams ,The Tiny Encryption Algorithm (TEA)CPSC 6128 – Network SecurityColumbus State
UniversityApril 26, 2008
[12] A. V. Reddy, “A Cryptanalysis of the Tiny Encryption Algorithm”, Master of Science, Department of Computer
Science in the Graduate School, The university of Alabama, 2003.
[13].A. P. Hiwarekar* VidyaPratishthan’s A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE
TRANSFORM College of Engineering, Vidyanagari, M.I.D.C. Baramati, Dist.Pune, Maharashtra, 2012
[14].Mohammed A. Shreef, Image Encryption Using Lagrange-Least SquaresInterpolation 2013
ABOUT THE AUTHORS
Sumee Rai completed her B.Tech (Information Technology) with Hons. in 2011 from Mahatma
Gandhi Mission’s College of Engineering and Technology, Noida (U.P) and currently pursuing
M.Tech (Computer Engineering) from Shobhit University, Modipuram, Meerut. Her research
interest includes Mobile Adhoc Network, Algorithm analysis and Mobile Communication.
Nidhi Tyagi received her Ph.D. in Computer Engineering & IT, from Shobhit University, Modipuram, Meerut.
Presently she is working as Associate Professor at Shobhit University, Meerut. Her area of interest includes system
software, Data Structures and web technologies.
Pradeep Kumar is working as an assistant professor in JSS Academy of Technical Education,
Noida (U.P). He received his M.Tech. in Computer Engineering from Shobhit University, Meerut
in 2011 and completed his B-Tech from College of Engineering, Roorkee, Uttrakhand in 2005. His
area of interest includes MANET and Network Security.

More Related Content

PDF
S.a.kalaiselvan udrpg dynamic key management based node
PDF
Security analysis of fbdk block cipher for digital images
PDF
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
PDF
Design and implementation of network security using genetic algorithm
PDF
Image Cryptography using RSA Algorithm
PDF
Comparative study of private and public key cryptography algorithms a survey
PDF
PDF
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
S.a.kalaiselvan udrpg dynamic key management based node
Security analysis of fbdk block cipher for digital images
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
Design and implementation of network security using genetic algorithm
Image Cryptography using RSA Algorithm
Comparative study of private and public key cryptography algorithms a survey
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers

What's hot (17)

PDF
50120140507006
PDF
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
PDF
IRJET- Comparison Among RSA, AES and DES
PDF
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
PDF
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
PDF
A new fangled symmetric block cipher using zig-zag scan patterns
PDF
New approach in symmetric block cipher security using a new cubical technique
PDF
IRJET-Triple Layered Security on Android Based SMS Transaction
PDF
Image encryption and decryption using aes algorithm
PDF
IRJET- Data Transmission using RSA Algorithm
PDF
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
PDF
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
PDF
A cloud security approach for data at rest
PDF
Secure image encryption using aes
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PDF
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
50120140507006
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
IRJET- Comparison Among RSA, AES and DES
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
A new fangled symmetric block cipher using zig-zag scan patterns
New approach in symmetric block cipher security using a new cubical technique
IRJET-Triple Layered Security on Android Based SMS Transaction
Image encryption and decryption using aes algorithm
IRJET- Data Transmission using RSA Algorithm
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
A cloud security approach for data at rest
Secure image encryption using aes
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Ad

Viewers also liked (16)

PDF
Fase I Yurelys Rangel C.I V- 10.877.774
PPT
Persistence hibernate
PDF
Field Service Engineer-LAB
PDF
Comparative Analysis of Face Recognition Algorithms for Medical Application
DOCX
Community Events Toolkit
PPT
Sila
ODP
Quinta sesión curso de Lliurex
PPTX
fuentes de apoyo económico para la financiación de propuestas o negocios verdes
PDF
Valsartan 137862-53-4-api
DOC
Dipanjana bhattacharya resume
PDF
Analysis of bending strength of bevel gear by FEM
PPT
Comportamento do consumidor - Teorias motivacionais
PDF
E mail маркетинг
PPTX
Training, Pruning and Ratooning in veg.crops
PDF
Recognising Property Rights In One's Body And Its Parts
PPT
Plan de Marketing Político
Fase I Yurelys Rangel C.I V- 10.877.774
Persistence hibernate
Field Service Engineer-LAB
Comparative Analysis of Face Recognition Algorithms for Medical Application
Community Events Toolkit
Sila
Quinta sesión curso de Lliurex
fuentes de apoyo económico para la financiación de propuestas o negocios verdes
Valsartan 137862-53-4-api
Dipanjana bhattacharya resume
Analysis of bending strength of bevel gear by FEM
Comportamento do consumidor - Teorias motivacionais
E mail маркетинг
Training, Pruning and Ratooning in veg.crops
Recognising Property Rights In One's Body And Its Parts
Plan de Marketing Político
Ad

Similar to Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function (20)

PDF
Lightweight Cryptography for Distributed PKI Based MANETS
PDF
I26043047
PDF
Node Authentication Using BLS Signature in Distributed PKI Based MANETS
PDF
Identity-Based Key Management in MANETs Using Public Key Cryptography
PDF
Az24339344
PDF
Ijctt v17 p128-copy-copy
PDF
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
PDF
Jf3416691674
PDF
Distributed private key generator in ibc
PDF
Secured key exchange by information reconciliation
PDF
Certificate less key management scheme in
PDF
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
PDF
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
PDF
PDF
Proactive Secret Sharing using a Trivariate Polynomial
PDF
W4301117121
PDF
An efficient distributed group key management using hierarchical approach wit...
PDF
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
PDF
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Lightweight Cryptography for Distributed PKI Based MANETS
I26043047
Node Authentication Using BLS Signature in Distributed PKI Based MANETS
Identity-Based Key Management in MANETs Using Public Key Cryptography
Az24339344
Ijctt v17 p128-copy-copy
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
Jf3416691674
Distributed private key generator in ibc
Secured key exchange by information reconciliation
Certificate less key management scheme in
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
Proactive Secret Sharing using a Trivariate Polynomial
W4301117121
An efficient distributed group key management using hierarchical approach wit...
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PDF
INTELLIGENT BLIND STICK
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
PDF
DETECTION OF MOVING OBJECT
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
INTELLIGENT BLIND STICK
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
OPTICAL CHARACTER RECOGNITION USING RBFNN
DETECTION OF MOVING OBJECT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Geodesy 1.pptx...............................................
DOCX
573137875-Attendance-Management-System-original
PDF
PPT on Performance Review to get promotions
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PPTX
web development for engineering and engineering
PPT
Project quality management in manufacturing
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Well-logging-methods_new................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech
bas. eng. economics group 4 presentation 1.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Geodesy 1.pptx...............................................
573137875-Attendance-Management-System-original
PPT on Performance Review to get promotions
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
web development for engineering and engineering
Project quality management in manufacturing
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Well-logging-methods_new................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 45 Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function Sumee Rai Nidhi Tyagi Pradeep Kumar Student, CS Associate Professor, CS Assistant Professor, CS Shobhit University, Shobhit University, JSSATE, UPTU Meerut-250110 Meerut-250110 Noida-201301 Abstract—Mobile adhoc network is collection of autonomous nodes that are frequently moving without the centralized control. Mobile adhoc networks are multi hop wireless networks without fixed infrastructure. Node frequently change topology, due to this type of behavior transformation of information from one node to another node is more complicated task. Decentralized nature of mobile adhoc network is more vulnerable to attack like denial of service (DOS) which consumes more bandwidth and resources. Security is major concern in adhoc network, so in this paper, we propose a new algorithm based on Lagrange polynomial and Laplace transform and inverse Laplace transform to enhance secure communication for MANET. This proposed algorithm provides security for transmission of information among node. Keywords—Mobile adhoc network, Lagrange Interpolation, Threshold Cryptography, Modular Arithmetic, Integral Transform I. INTRODUCTION Adhoc network is self-dependable infrastructure less network. Every node moves independently and communicates with each other without the help of any central control. Connection among mobile nodes are made through waves, topology changes dynamically during over all process of communication. Due to inherent characteristic of MANETs: open medium, lack of centralized control, dynamic movement of node ,etc, MANETs are highly vulnerable to attacks. Problem formulation: Main problem is highly secure communication among MANET node, so we proposed a secure algorithm based on Lagrange Polynomial and Laplace Transform. II. BACKGROUND Threshold Cryptography is the way to enhance security by creating partial secret shares and distribute among a set of n values based on node id. In a threshold cryptography scheme, out of n entities, we choose t (threshold value) entities (t<n) and calculate secret information on the basis of polynomial function. Quantum Cryptography (QC) depends on the uncertainty principle of quantum with which it is impossible to for an eavesdropper to detect the data being transmitted without disturbing the transmission. This method is not based on mathematics instead it is developed on the base of physics. The changes made by the eavesdropper will anonymously introduce high error rate in the transmission between sender and receiver. It makes use of photons (light particles) to generate keys. Provably secure key distribution is achieved by using two channels between sender and receiver. Public and quantum channels are used to transmit encrypted data and key distribution respectively. Integral transform has many applications in various fields such as Mechanics, Electrical circuit, Beam problems, Heat conduction, Wave equation, Transmission lines, Signals and Systems, Control systems, Communication Systems, Hydrodynamics, Solar systems. In this paper, we will discuss application of cryptography. In Shamir’s idea of identity- based cryptosystem [3], the recipient’s identity i is used to generate the encryption key, and the decryption key is derived from I and a random seed k. In an identity-based signature scheme, the signature key is generated from sender identity I and a random seed k, and the verification key is derived from sender’s identity i. Many IBC schemes [3,6] use threshold cryptography which originated from Shamir , for their key management. Shamir gives a solution to the problem of sharing a secret among a number of users. In his paper, he identifies the problem of how to divide data D into n pieces in such a way that D is easily reconstruct able from any t pieces, but even complete knowledge of t − 1 pieces reveals absolutely no information about D. In [8] a distributed pair wise key establishment scheme based on the concept of bivariate polynomials. In their method, any mobile node in an ad hoc network can securely communicate with other nodes just by knowing their corresponding IDs. The bivariate polynomials are shared in such a manner that the shares depend on the coefficient matrix of the polynomial, the requesting node's ID and the ID of the nodes that respond to the request. Identity-based cryptography specifies a cryptosystem in which both public and private keys are based on the identities of the users.[3,6] The idea of IBC was first proposed by Shamir in 1984.[7] Such a scheme has the property that
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 46 a user’s public key is an easily calculated function of his identity, while a user’s private key can be calculated for him by a trusted authority, called a Private Key Generator (PKG).Compared to traditional PKI, it saves storage and transmission of public keys and certificates, which is especially attractive for devices forming MANETs. The identity based cryptosystem [9] and shared the session key among the nodes of MANET. Identity based cryptosystem provides a new but safe strategy for communication in MANET, Strategy uses Lagrange interpolation to share the session key among the nodes of MANET. This paper realizes the safe communication in the MANET. Integral transformation based encryption provide higher secure algorithm. In this process use Laplace and inverse Laplace transformation. Algorithm which makes it suitable for embedded systems that require high performance; ease of implementation, high speed, low power consumption and low cost beside security. Proposed Security Architecture and Mechanism for wireless Information Transmission The architecture and detailed mechanism is discussed in section discus below respectively. III. SECURITY ARCHITECTURE Figure illustrates the working architecture based on threshold cryptography, Lagrange polynomial and Integral transformation. The proposed architecture is divided into modules like Generate session key using node id at both sender and receiver side, encryption using Integral transformation and decryption done by inverse integral transformation method using exponential function. Fig. 1 Secure Architecture based on Threshold Cryptography
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 47 Fig. 1 Flow Chart for generating partial keys, Encryption and decryption IV.KEY GENERATION, ENCRYPTION AND DECRYPTION Step -1 Key Generation In the first Module of key generation we explain about how we generate the session key by using threshold cryptography and Lagrange interpolation with modularithmetic to generate session key required Minimum tTh (Threshold value) no of node in cluster. Consider a Polynomial equation GF (p) is Finite field p>n Choose a0, a 1 , a 2 , a k-1∈GF (p) F(x) = (a0x0 + a 1 x1 + a 2 x 2 + … ..............+ a t-1 x t-1 ) mod p F(0)= a0=secret key (SK) and p is a huge prime number and a1, a2…, and ak-1 are arbitrarily chosen from Z/PZ. Then each user of identity id is provided with it partial key Si = f (idi). Their shares provide t distinct points (x, y) = (i, Si) calculate polynomail by using lagrange interpolation [5] ( ) = ∑ ∏ , Eq-1 Lagrange interpolation Since f (0) = a0 = S, the shared secret can be expressed as = Where = − , Secret key is genrated by t arbitary node(minimum no of threshold node) by using F(0)=a0modp=(SK) Step-2 Encryption Process Introduction to the Integral Transform Method The foundation of Integral theory is Lerch's cancellation law. The direct Integral transform or the integral of a function f (t) defined for 0≤t <∞ is the ordinary calculus integration problem
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 48 L{f(t)}= F(s)= ∫ f(t)e-st dt L-1 {F(S)}=f(t) L-1 is inverse Integral transform. Integral transformation is linear function that satisfies following 1. L{f(t) ±g(t)}= L{f(t)} ± L{g(t)} 2. L{d1f(t) = d1L{f(t)} d1 is constant. There are many application of Laplace transform like to solve differential equation, in physics and engineering. In this paper we use Laplace transformation to provide the security of information during transmission from one node to another node in mobile Adhoc network inter and intra communication. Using exponentail function = 1 + 1! + ( ) 2! + ( ) 3! + ⋯, k any real no.Multiply both sides by x = (1 + 1! + ( ) 2! + ( ) 3! + ⋯ ), k any real no. = 1 + 1! + ( ) 2! + ( ) 3! + ⋯, k is shared key generated by LaGrange polynomial. Let us consider plain text ( ) = = 0 1 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! …, ( ) = = ( 01 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! … ), ( ) =∑ (∞ 2n xn+1 / !) Taking Integral transform both side L ( )} = { } = { ( 01 + 1 ! + 2 ( ) ! + 3 ( ) ! + 4 ( ) ! + 5 ( ) ! … ), } L{ ( )}= + + + + … … … … … … … … … .. Modular Arithmetic Modular Arithmetic discovered by K.F. Gauss. Two numbers a and b are said to be equal or congruent modulo n iff n|(a-b), i.e. iff their difference is exactly divisible by n. Usually a, b, are nonnegative and n a positive integer. We write a = b (mod n). Ci=Gi mod26 for i=0, 1, 2, 3……………………n Ci=Gi-26difor i=0, 1, 2, 3……………………n All di for i=0, 1, 2, 3……………n Sharable between sender and receiver . C0, C1 ,C2 , C3 , C4 ……..Cn are Cipher text of Plain text P0, P1 , P2 ,P3, P4…………….Pn Step-3 Decryption Process Gi=Ci+ 26difor i=0, 1, 2, 3……………………n using di generate all Gi L{ ( )}= + + + + Taking inverse Laplace transforms both sides using LaGrange interpolation generate session key and generate P0, P1 , P2 ,P3, P4……….Pn Mechanism for secure Information transmission The proposed mechanism is divided into main three phases as follows. PHASE-1: Secret Key Generation using LaGrange interpolation polynomial  Random no generator generate node id.  Using node id Generate shared information of secret key A B C D - - Z 0 1 2 3 - - 25
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 49  We fixed threshold no of node id ,to regenerate secret key  Consider a Polynomial equation GF (p) is Finite field p>n  Choose a0, a 1 , a 2 , a k-1∈GF (p) g(x) = (a0x0 + a 1 x1 + a 2 x 2 + … + a t-1 x t-1 ) mod p Total No of user=N; for(i=0; i<t; i++) {Id[i]; } for(i=0; i<t; i++) { nr=1; dr=1; for(j=0; j<t; j++) { If(j≠i) { nr=nr*(x-Id[j]); dr=dr*(Id[i])- Id[j]); g(x)=(nr/dr)*FId[i])); /*Polynomial Equation generated by node id*/ } Put the value of x and Generate Secrete KEY; Sk=g(x)mod p; /*SK-Session Key*/ /*session key use for secure communication among nodes.*/ PHASE-2: Encryption  Secret key generate from LaGrange polynomial use as key in Integral transform  Generate secure message using Integral transform. PHASE-3: Decryption  Generate session key using shared partial information  Decrypt message using inverse integral transformation. EXAMPLE Key Generation Choose a0, a 1 , a 2 , a k-1∈GF (p) F(x) = (a0x0 + a 1 x1 + a 2 x 2 + … ..............+ a t-1 x t-1 ) mod p a0 =2, a1, a2=1 ,a3=1 let us consider node id generated by random no generator consider 4 node id0=0 id1=1,id2=2,id3=3 prime no p=5, plynomail equation f(x)=(x3+x2-x+2)mod5 generate partial key using lagrange polynomail f(0)=2, f(1)=3, f(2)=12, f(3)=5, these partial key send to reciver side ,reciver generate session key using these partial key. k=f(0)=2mod5=2 Encryption Process Let us consider plain text MONDAY P0=12, P1=14,P2=15,P3=3,P4=0,P5=24 ( ) = = 0 1 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! …,
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 50 ( ) = = ( 01 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! … ), for k=2 ( ) = = (12 + 14 1! + 15 ( ) 2! + 3 ( ) 3! + 0 ( ) 4! + 24 ( ) 5! … ), by using Integral transformation ,taking Integral transform both side of give equation consider k generated by Lagrange polynomial, L{ ( )} = { } = { 12 + 14 ! + 15 ( ) ! + 3 ( ) ! + 0 ( ) ! + 24 ( ) ! … }, for k=2 L{ ( )} = { } = { 12 + 14 ! + 15 ( ) ! + 3 ( ) ! + 0 ( ) ! + 24 ( ) ! … }, taking Integral transform both side = + + + + + q0=12, q1=56,q2=120,q3=136,q4=0,q5=4608 12=26(0)+12, 56=26(2)+4, 120=26(4)+22, 136=26(6)+0 , 0=26(0)+0 , 4608=26(177)+4 C0=12, C1=4, C2=22 ,C3=0, C4=0 , C5=4 are cipher text for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 shared between sender and receiver. messages ‘MONDAY’ converted to ‘ MEWAAD’. Decryption Process 1. using shared partial key generate secured key f(0)=2, f(1)=3, f(2)=12, f(3)=5, (X0=0 , Y0=2), (X1=1 , Y1=3), (X2=2 , Y2=12) , (X3=3 , Y3=5) ( ) = − − , f(x)=(x3 +x2 -x+2)mod5 f(0)=(0+0-0+2)mod5=2 ,k=2 for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 Received message is MEWAAD q0= 26*0+12 =12 q1=26*2+4=56 q2=26*4+22=120q3=26*6+ 0=136 q4=26*0+0=0 q5=26*177+4=4068 L{ ( )} == + + + + + taking inverse integral transform both side using k=2 ( ) = = (12 + 14 2 1! + 15 (2 ) 2! + 3 (2 ) 3! + 0 (2 ) 4! + 24 (2 ) 5! … ), messages ‘ MEWAAD’ converted to. ‘MONDAY’ V. CONCLUSION This proposed algorithm is more secure because it is light weighted and in this algorithm first we secure the secret key using Lagrange polynomial and integral transformation this higher secure method to secure key using node id in mobile adhoc network. And after producing key we use this key for encryption and decryption that algorithm based on Laplace transformation and modular arithmetic. Algorithm provides higher security.
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 51 VI.FUTURE WORK In this paper, a secure system for MANET is presented, which solves the problem of scalability of nodes in MANET. We can improve the performance of the system by reducing the communication overhead among nodes. REFERENCES [1] M. B. Abdelhalim , M. El-Mahallawy , M. Ayyad , A. Elhennawy , Design & Implementation of an Encryption Algorithm for use in RFID System , International Journal of RFID Security and Cryptography (IJRFIDSC), Volume 1, Issues 1/2, March/June 2012 [2 ] Mamatha.T , Network Security for MANETS International Journal of Soft Computing and Engineering (IJSCE) , Volume-2, Issue-2, May 2012 [3] Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai , A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 14, NO. 2, SECOND QUARTER 2012 [4] Lu Li, Ze Wang, Wenju Liu and Yunlong , A Certificate less Key Management Scheme in Mobile Ad Hoc Networks 2011 IEEE [5] A.Rajaram , Dr.S.Palaniswam, A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks , International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, July 2010 [6] EDUARDO DA SILVA, ALDRI L. DOS SANTOS, AND LUIZ CARLOS P. ALBINI , Identity based key management in mobile adhoc networks and applications, IEEE Wireless Communications • October 2008 [7] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO’84, LNCS, 1985, [8] Anindo Mukherjee, Hongmei Deng, Dharma Agrawal , Distributed Pairwise Key Generation Using Shared Polynomials for Wireless Ad Hoc Networks , Center of Distributed And Mobile Computing,University Of Cincinnati, Cincinnati [9] Li Wang, Jiu Hui Zhang “ Security Strategy of MANET Based on Identity- Based Cryptosystems” 2010 IEEE [10] XU Xiao-long XIONG Jing-Yi, CHENG Chun-Ling “The Model and the Security Mechanism of the Information Retrieval System based on Mobile Multi­ Agent” 2010 IEEE [11]Derek Williams ,The Tiny Encryption Algorithm (TEA)CPSC 6128 – Network SecurityColumbus State UniversityApril 26, 2008 [12] A. V. Reddy, “A Cryptanalysis of the Tiny Encryption Algorithm”, Master of Science, Department of Computer Science in the Graduate School, The university of Alabama, 2003. [13].A. P. Hiwarekar* VidyaPratishthan’s A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM College of Engineering, Vidyanagari, M.I.D.C. Baramati, Dist.Pune, Maharashtra, 2012 [14].Mohammed A. Shreef, Image Encryption Using Lagrange-Least SquaresInterpolation 2013 ABOUT THE AUTHORS Sumee Rai completed her B.Tech (Information Technology) with Hons. in 2011 from Mahatma Gandhi Mission’s College of Engineering and Technology, Noida (U.P) and currently pursuing M.Tech (Computer Engineering) from Shobhit University, Modipuram, Meerut. Her research interest includes Mobile Adhoc Network, Algorithm analysis and Mobile Communication. Nidhi Tyagi received her Ph.D. in Computer Engineering & IT, from Shobhit University, Modipuram, Meerut. Presently she is working as Associate Professor at Shobhit University, Meerut. Her area of interest includes system software, Data Structures and web technologies. Pradeep Kumar is working as an assistant professor in JSS Academy of Technical Education, Noida (U.P). He received his M.Tech. in Computer Engineering from Shobhit University, Meerut in 2011 and completed his B-Tech from College of Engineering, Roorkee, Uttrakhand in 2005. His area of interest includes MANET and Network Security.