Implementation of security features in MANETs using SHA-3 standard algorithm

Ravilla Dilli, Putta Chandra Sekhar Reddy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authentication. The hybrid routing technique which we have used was Zone Routing Protocol (ZRP), a hybrid MANET is routing protocol using Network Simulator 2 (NS2). This paper implements a HMAC-SHA3-512 algorithm in ZRP which leads to higher throughput and packet delivery fraction but at the expense of the increased end to end delay. From our performance analysis using 64-bit Intel Processor, it shows that the cost of implementing a HMAC-SHA3-512 algorithm gives 50% performance improvement over similar implementations of HAMC-SHA3-256.

Original languageEnglish
Title of host publication2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages455-458
Number of pages4
ISBN (Electronic)9781509010202
DOIs
Publication statusPublished - 09-12-2016
Event1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2016 - Bengaluru, India
Duration: 06-10-201608-10-2016

Conference

Conference1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2016
Country/TerritoryIndia
CityBengaluru
Period06-10-1608-10-16

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications
  • Signal Processing
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'Implementation of security features in MANETs using SHA-3 standard algorithm'. Together they form a unique fingerprint.

Cite this