AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network

  • R. PreethiEmail author
  • M. Sughasiny
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 940)


In Mobile Ad hoc Network (MANET), mobile nodes are especially prone to the security threats of eavesdropping, interception, denial-of-service and routing attacks. Some of these problems may be solved with the use of cryptographic protocols. In the recent literature many works make specific proposals on how to use well-known cryptographic techniques to secure MANETs. But these are relies keys for encryption and decryption. For decryption, keys must be shared from source to destination. But secret key sharing in MANET is computationally unsafe and inconsistent due to its dynamic nature. To tackle this problem, this paper proposed an Asymmetric Key Cryptography based on Secret Sharing (AKCSS) Algorithm. This algorithm provides two types of security. One is Secret Sharing, another one is Secure Communication. For Secret Sharing, AKCSS algorithm splits secret key into N shares and transmits each share through different paths from source to destination. For reduce nodes energy consumption, minimum cost routing paths are taken. After receive each share, the destination node can reconstruct secret key. To secure communication, source node encrypts its message with public key which provides cipher text and forwards it via Minimum Cost Routing Path (MCRP). For message transmission from source to destination, MCRP can reduce energy consumption. After receive cipher text, destination node can decrypt using secret key. Experimental results demonstrate that the proposed protocol provides strong security for secret sharing and message transmission. Furthermore, it reduces energy consumption efficiently.


Cryptography Secret sharing Routing path Cipher text Energy Security Message transmission 


  1. 1.
    Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Blackwell, Hoboken (2007)CrossRefGoogle Scholar
  2. 2.
    Jesudoss, A., Subramaniam, N.P.: EAM: architecting efficient authentication model for internet security using image-based one time password technique. Indian J. Sci. Technol. 9(7) (2016).
  3. 3.
    Somassoundaram, T., Subramaniam, N.P.: High capacity image steganography using secret key for medical information. Indian J. Sci. Technol. 9(3) (2016).
  4. 4.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. Cornell Univ. Secur. Ad Hoc Netw. Presented by Johanna Vartiainen 1(26), 24–30 (1999)Google Scholar
  5. 5.
    Revathi, V., Pushpalatha, M., Sornalakshmi, K.: Implementation of key exchange and secure routing mechanism in a wireless ad hoc test beds. Indian J. Sci. Technol. 9(10) (2016).
  6. 6.
    Gomathi, K., Parvathavarthini, B.: An enhanced distributed weighted clustering routing protocol for key management. Indian J. Sci. Technol. 8(4) (2015). Scholar
  7. 7.
    Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., Sanap, M.: AES algorithm using 512 bit key implementation for secure communication. Int. J. Innov. Res. Comput. Commun. Eng. 2(3), 3516–3522 (2014)Google Scholar
  8. 8.
    Patil, M.S., Mala, L.M.: Design of high speed 128 bit AES algorithm for data encryption. Int. J. Curr. Eng. Technol. (2013). ISSN 2277–4106, ©2013 INPRESSCOGoogle Scholar
  9. 9.
    Rayarikar, R., Upadhyay, S., Pimpale, P.: SMS encryption using AES algorithm on android. IJCA 50(19), 12–17 (2012)CrossRefGoogle Scholar
  10. 10.
    Barker, E., Kelsey, J.: Random Number Generation Using Deterministic Random Bit Generators, NIST Special Publication 800-90A, January 2012Google Scholar
  11. 11.
    Rani, N.: Suspicious email detection system via triple DES algorithm: cryptography approach. Int. J. Comput. Sci. Mob. Comput. 4(5), 552–565 (2015)Google Scholar
  12. 12.
    Agrawal, M., Mishra, P.: A modified approach for symmetric key cryptography based on blowfish algorithm. Int. J. Eng. Adv. Technol. 1(6), 79–83 (2012)Google Scholar
  13. 13.
    Abudin, J., Keot, S.K., Malakar, G., Borah, N.M., Rahman, M.: Modified RSA public key cryptosystem using two key pairs. Int. J. Comput. Sci. Inf. Technol. 5(3), 3548–3550 (2014)Google Scholar
  14. 14.
    Wang, M.Y., Su, C.P., Horng, C.L., Wu, C.W., Huang, C.T.: Single and multi-core configurable AES architectures for flexible security. IEEE Trans. Very Large Scale Integr. Syst. 18(4), 541–552 (2010)CrossRefGoogle Scholar
  15. 15.
    Kim, C.H.: Improved differential fault analysis on AES key schedule. IEEE Trans. Inf. Forensics Secur. 7(1), 41–50 (2012)CrossRefGoogle Scholar
  16. 16.
    Li, D.J., Wang, Y., Chen, H.: The research on key generation in RSA public key cryptosystem, pp. 578–580 (2012)Google Scholar
  17. 17.
    Chang, D., Gupta, K.C., Nandi, M.: Rc4-hash: a new hash function based on RC4. In: Proceedings of the International Conference on Cryptology, Kolkata, India, 11–13 December 2006Google Scholar
  18. 18.
    Pirbhulal, S., Zhang, H., Eshrat, M., Alahi, E., Ghayvat, H.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17, 69 (2017). Scholar
  19. 19.
    Alimohammadi, M., Pouyan, A.A.: Performance analysis of cryptography methods for secure message exchanging in VANET. Int. J. Sci. Eng. Res. 5(2), 912 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceSrimad Andavan Arts and Science CollegeTrichyIndia

Personalised recommendations