Abstract
The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.
Original language | English |
---|---|
Title of host publication | 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 154-159 |
Number of pages | 6 |
ISBN (Electronic) | 9781479962082 |
DOIs | |
Publication status | Published - 12-03-2015 |
Event | 2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 - Shillong, India Duration: 29-01-2015 → 30-01-2015 |
Conference
Conference | 2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015 |
---|---|
Country/Territory | India |
City | Shillong |
Period | 29-01-15 → 30-01-15 |
All Science Journal Classification (ASJC) codes
- Computer Science Applications
- Software
- Electrical and Electronic Engineering
- Information Systems
- Computer Networks and Communications