TY - GEN
T1 - Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs
AU - Ravilla, Dilli
AU - Putta, Chandra Shekar Reddy
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/3/12
Y1 - 2015/3/12
N2 - The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.
AB - The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.
UR - https://www.scopus.com/pages/publications/84936144964
UR - https://www.scopus.com/pages/publications/84936144964#tab=citedBy
U2 - 10.1109/EDCAV.2015.7060558
DO - 10.1109/EDCAV.2015.7060558
M3 - Conference contribution
AN - SCOPUS:84936144964
T3 - 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
SP - 154
EP - 159
BT - 2015 International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2015 1st International Conference on Electronic Design, Computer Networks and Automated Verification, EDCAV 2015
Y2 - 29 January 2015 through 30 January 2015
ER -