Implementation of security features in MANETs using SHA-3 standard algorithm

Ravilla Dilli, Putta Chandra Sekhar Reddy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authentication. The hybrid routing technique which we have used was Zone Routing Protocol (ZRP), a hybrid MANET is routing protocol using Network Simulator 2 (NS2). This paper implements a HMAC-SHA3-512 algorithm in ZRP which leads to higher throughput and packet delivery fraction but at the expense of the increased end to end delay. From our performance analysis using 64-bit Intel Processor, it shows that the cost of implementing a HMAC-SHA3-512 algorithm gives 50% performance improvement over similar implementations of HAMC-SHA3-256.

Original languageEnglish
Title of host publication2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages455-458
Number of pages4
ISBN (Electronic)9781509010202
DOIs
Publication statusPublished - 09-12-2016
Event1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2016 - Bengaluru, India
Duration: 06-10-201608-10-2016

Conference

Conference1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2016
CountryIndia
CityBengaluru
Period06-10-1608-10-16

Fingerprint

Mobile ad hoc networks
Mobile Ad Hoc Networks
Message Authentication Code
Authentication
Routing Protocol
Routing protocols
Routing
Data Integrity
Network routing
End-to-end Delay
High Throughput
Performance Analysis
Simulator
Simulators
Throughput
Standards
Costs

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications
  • Signal Processing
  • Computational Mathematics

Cite this

Dilli, R., & Reddy, P. C. S. (2016). Implementation of security features in MANETs using SHA-3 standard algorithm. In 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016 (pp. 455-458). [7779410] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CSITSS.2016.7779410
Dilli, Ravilla ; Reddy, Putta Chandra Sekhar. / Implementation of security features in MANETs using SHA-3 standard algorithm. 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 455-458
@inproceedings{05229c0070644a5aa7e91de534ef438e,
title = "Implementation of security features in MANETs using SHA-3 standard algorithm",
abstract = "In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authentication. The hybrid routing technique which we have used was Zone Routing Protocol (ZRP), a hybrid MANET is routing protocol using Network Simulator 2 (NS2). This paper implements a HMAC-SHA3-512 algorithm in ZRP which leads to higher throughput and packet delivery fraction but at the expense of the increased end to end delay. From our performance analysis using 64-bit Intel Processor, it shows that the cost of implementing a HMAC-SHA3-512 algorithm gives 50{\%} performance improvement over similar implementations of HAMC-SHA3-256.",
author = "Ravilla Dilli and Reddy, {Putta Chandra Sekhar}",
year = "2016",
month = "12",
day = "9",
doi = "10.1109/CSITSS.2016.7779410",
language = "English",
pages = "455--458",
booktitle = "2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Dilli, R & Reddy, PCS 2016, Implementation of security features in MANETs using SHA-3 standard algorithm. in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016., 7779410, Institute of Electrical and Electronics Engineers Inc., pp. 455-458, 1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2016, Bengaluru, India, 06-10-16. https://doi.org/10.1109/CSITSS.2016.7779410

Implementation of security features in MANETs using SHA-3 standard algorithm. / Dilli, Ravilla; Reddy, Putta Chandra Sekhar.

2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 455-458 7779410.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Implementation of security features in MANETs using SHA-3 standard algorithm

AU - Dilli, Ravilla

AU - Reddy, Putta Chandra Sekhar

PY - 2016/12/9

Y1 - 2016/12/9

N2 - In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authentication. The hybrid routing technique which we have used was Zone Routing Protocol (ZRP), a hybrid MANET is routing protocol using Network Simulator 2 (NS2). This paper implements a HMAC-SHA3-512 algorithm in ZRP which leads to higher throughput and packet delivery fraction but at the expense of the increased end to end delay. From our performance analysis using 64-bit Intel Processor, it shows that the cost of implementing a HMAC-SHA3-512 algorithm gives 50% performance improvement over similar implementations of HAMC-SHA3-256.

AB - In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authentication. The hybrid routing technique which we have used was Zone Routing Protocol (ZRP), a hybrid MANET is routing protocol using Network Simulator 2 (NS2). This paper implements a HMAC-SHA3-512 algorithm in ZRP which leads to higher throughput and packet delivery fraction but at the expense of the increased end to end delay. From our performance analysis using 64-bit Intel Processor, it shows that the cost of implementing a HMAC-SHA3-512 algorithm gives 50% performance improvement over similar implementations of HAMC-SHA3-256.

UR - http://www.scopus.com/inward/record.url?scp=85010443362&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85010443362&partnerID=8YFLogxK

U2 - 10.1109/CSITSS.2016.7779410

DO - 10.1109/CSITSS.2016.7779410

M3 - Conference contribution

SP - 455

EP - 458

BT - 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Dilli R, Reddy PCS. Implementation of security features in MANETs using SHA-3 standard algorithm. In 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 455-458. 7779410 https://doi.org/10.1109/CSITSS.2016.7779410