Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs

Dilli Ravilla, Chandra Shekar Reddy Putta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.

Original languageEnglish
Title of host publication2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages154-159
Number of pages6
ISBN (Electronic)9781479962082
DOIs
Publication statusPublished - 12-03-2015
Event2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 - Shillong, India
Duration: 29-01-201530-01-2015

Conference

Conference2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
CountryIndia
CityShillong
Period29-01-1530-01-15

Fingerprint

Hash functions
Routing protocols
Authentication
Throughput
Cryptography
Wireless networks
Simulators
Network protocols
Processing

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering
  • Information Systems
  • Computer Networks and Communications

Cite this

Ravilla, D., & Putta, C. S. R. (2015). Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. In 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 (pp. 154-159). [7060558] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/EDCAV.2015.7060558
Ravilla, Dilli ; Putta, Chandra Shekar Reddy. / Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 154-159
@inproceedings{2c8ac77fae9c442db352a9a3d1150a20,
title = "Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs",
abstract = "The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.",
author = "Dilli Ravilla and Putta, {Chandra Shekar Reddy}",
year = "2015",
month = "3",
day = "12",
doi = "10.1109/EDCAV.2015.7060558",
language = "English",
pages = "154--159",
booktitle = "2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Ravilla, D & Putta, CSR 2015, Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. in 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015., 7060558, Institute of Electrical and Electronics Engineers Inc., pp. 154-159, 2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015, Shillong, India, 29-01-15. https://doi.org/10.1109/EDCAV.2015.7060558

Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. / Ravilla, Dilli; Putta, Chandra Shekar Reddy.

2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 154-159 7060558.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs

AU - Ravilla, Dilli

AU - Putta, Chandra Shekar Reddy

PY - 2015/3/12

Y1 - 2015/3/12

N2 - The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.

AB - The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.

UR - http://www.scopus.com/inward/record.url?scp=84936144964&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84936144964&partnerID=8YFLogxK

U2 - 10.1109/EDCAV.2015.7060558

DO - 10.1109/EDCAV.2015.7060558

M3 - Conference contribution

AN - SCOPUS:84936144964

SP - 154

EP - 159

BT - 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Ravilla D, Putta CSR. Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. In 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 154-159. 7060558 https://doi.org/10.1109/EDCAV.2015.7060558