Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs

Dilli Ravilla, Chandra Shekar Reddy Putta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.

Original languageEnglish
Title of host publication2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages154-159
Number of pages6
ISBN (Electronic)9781479962082
DOIs
Publication statusPublished - 12-03-2015
Event2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 - Shillong, India
Duration: 29-01-201530-01-2015

Conference

Conference2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
CountryIndia
CityShillong
Period29-01-1530-01-15

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering
  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs'. Together they form a unique fingerprint.

Cite this