Вы находитесь на странице: 1из 5

This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.

A Review Paper of an Encryption Scheme using


Network Coding
for Energy Optimization in MANET

Shruti Patel Fenil Khatiwala


Department of Computer Engineering Department of Computer Engineering
CGPIT, Bardoli CGPIT, Bardoli
Bardoli, India Bardoli, India
shrutipatel01@yahoo.com fenil.khatiwala@utu.ac.in

Abstract— Mobile ad-hoc network is a collection of mobile nodes In without network coding, Alice sends data to router and
which forms an instant network without fixed topology and can then router sends data to Bob. Only then Bob sends data to
be arranged dynamically. Energy saving and security are router and then router sends it to Alice. So this requires 4
important issue in MANET. Network coding technique is used to transmission.
reduce energy consumption by less transmissions in MANET. To
achieve a security, there are many encryption scheme are
available. Out of which p-coding technique is lightweight
encryption scheme which provides confidentiality. P-coding is to
let the source randomly permute the symbol of each packet. So
eavesdropper can’t obtain the meaningful information without
knowing the permutation encryption function and coding vector.
Index Terms— MANET, Security, Energy optimization,
Fig.2. Using Network Coding [3]
Network coding, P-coding etc.
With network coding, Alice and Bob simultaneously sends
I. INTRODUCTION data to intended receiver. It requires only 3 transmission. So if
Mobile ad-hoc network is a collection of mobile nodes we considered that energy is not consumed by
which forms an instant network without fixed topology and encryption/decryption, then ¼ energy can be saved.
can be arranged dynamically. Mobile nodes can communicate To provide a security in MANET, some or all of the
with each other directly without use of any centralized following security goal have to be achieved.
authority. It can easily collect emergency data in disastrous There are many security goal: Authentication, Integrity,
area and perform communication in battle field [1]. There are Confidentiality, Non-repudiation etc.
many issues of mobile ad-hoc network: To minimize energy Confidentiality: Keep the information sent unreadable to
consumption, routing, security etc. To minimize energy unauthorized users or nodes. One way to keep information
consumption and Security are major issues in mobile ad-hoc confidential is to encrypt the data [6].
network. Integrity: Ensure that the data has been not altered during
Network coding is a technique which is used to reduce the transmission. This service can be provided using cryptography
energy consumption by less transmission [1]. It allows hash function along with some form of encryption [6].
intermediate node to mix incoming data flows [2]. So two or Authentication: This service verifies the identity of node or a
more data are combined and transmitted to the neighbor node, user, and to be able to prevent impersonation. It can be
in order to reduce the energy consumption. Network coding is providing using encryption along with cryptographic hash
performed using XOR operation on packet data. function, digital signature and certificates [6].
For Ex, Alice and Bob wants to exchange the data via Non-repudiation: Ensure that parties can prove the
router. Fig. 1. Shows the transmission of data without transmission or reception of information by another party [6].
network coding and fig. 2. Shows the transmission of data There are many encryption scheme like DES (Data
with network coding. Encryption Standard), 3DES (Triple DES), AES (Advanced
Encryption Standard), P-coding etc. used for provide a
confidentiality.
To achieve a security, MANET security solution also
needs to consume a low amount of energy.
The remainder of the paper has been organized as follows:
Fig.1. Without Network Coding [3]
Section I describes Introduction of Mobile ad-hoc network.

978-1-4673-9338-6/16/$31.00 2016
c IEEE 1054
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.

Section II describes the Literature Survey of different Y will have received both message, while node X has still only
encryption techniques also it describes how network coding message a at the end of a single arbitrary time unit.
technique is used to reduced energy consumption. Section III As Fig. 4. Says that if we make use of network coding, we
describes the Comparative Analysis of different encryption give node D the capability to transmit a linear combination of
techniques. Section IV describes Conclusion of the work. the message a and b via E to node X and Y. we also give
II. LITERATURE SURVEY capability to decode the message by using the other message
which it already received. Thus, both nodes X and Y have
Security and minimizing energy consumption are two
both messages at the end of a single arbitrary time unit.
major issue in mobile ad-hoc network. Security can be achieve
through many encryption scheme. Network coding is one of
DIFFERENT TYPES OF ENCRYPTION SCHEME
technique to reduce energy consumption.
Network coding [8]:
There are different techniques to provide Security:
To reduce energy consumption, network coding is one of
the technique. x DES
How Network coding works x AES
Network coding is performed using XOR operation. x 3DES
Here, node A need to transmit their message a and b to both x Homomorphic Encryption Function
nodes X and Y. Each node can deliver their own message to x P-coding
its neighbor node.
Fig. 3. Shows how data is transmitted by traditional A. DES (Data Encryption Standard) Algorithm [9]
technique and fig. 4. Shows how network coding works during It is a block cipher which encrypts 64 bit plain text at a
data transmission. time and it uses 56 bit key. This was based on symmetric key
algorithm, in which the same key will be used for both
encryption and decryption. DES has 16 rounds, in which a
total of 16 processing steps are being applied on the input
plain text and it produce cipher text. First, 64 bit data is passed
through the initial permutation phase and then 16 rounds of
processing takes place and lastly, final permutation is carried
out on the input plain text which results in 64 bit cipher text.
The drawback of this algorithm is that it can be easily
prone to Brute Force Attack, in which the hacker attempts to
break the key by applying all possible combinations. In DES,
there are only 256 possible combinations which are quite easy
to crack. So DES is not so secure.
B. AES (Advanced Encryption Standard) [4][9]
Fig.3. Without Network Coding [8] AES (Advanced Encryption Standard) is a symmetric
block cipher. It uses variable key length of 128, 192 and 256
bits. If both the block length and key length are 128 bits, then
AES will perform 9 processing rounds. If the block and key
are of 192 bits, then AES performs 11 processing rounds. If
the block and key are of length 256 bits then it performs 13
processing rounds.
Each processing round involves four steps:
Substitute bytes: Uses an S-box to perform a byte by byte
substitution of the block.
Shift rows: A simple permutation.
Mix column: A substitution method where data in each
column from the shift row step is multiplied by the algorithms
matrix.
Add round key: The key for the processing round is XOR
with the data.
Fig.4. Using Network Coding [8] AES encryption is fast and flexible; it can be implemented
on various platforms. The key length is variable which sense
As fig. 3. says that in traditional routing, node D simply the processing speed and memory usage is variable in different
receive the information and replicate the information which it environment, due to flexible key length, it could be used in
receives from the previous sender. In this case, node D both higher secure and for less secure environments
receives both message a and b simultaneously. Node D will
send out message a first and then message b. Thus, only node

1055
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.

In this scheme, message contents are encrypted using the


Advanced Encryption Standard (AES) algorithm. This scheme
is used for providing confidentiality. By this scheme, security
can be increased but encryption/decryption time is more. So
more CPU time is used which is reflecting the energy
consumption. This scheme has computation overhead.

C. 3DES (Triple DES) [9]


3DES (Triple DES) is an enhancement of DES. It is 64 bit
block size with 112 bit or 168 bit key size. It is similar to the
one in the original DES but applied 3 times to increase the
encryption level and the average safe time. 3DES is slower Fig.5. Permutation encryption [7]
than other block cipher methods.
In this scheme, message contents are encrypted using the P-Coding offers the following features: 1) Security: P-
3DES algorithm. This scheme is used for providing Coding is computationally difficult for a global eavesdropper
confidentiality. By this scheme, security can be increased but to recover any meaningful information 2) Efficiency: Because
encryption/decryption time is more. So more CPU time is used of the lightweight nature of permutation encryption, p-coding
which is reflecting the energy consumption. This scheme has is quite efficient to be carried out, which is of special benefit
computation overhead. for resource-constraint systems, such as wireless sensor
networks or MANET. 3) Transparency: P-Coding is
D. HEFs (Homomorphic Encryption Functions) [5] transparent to intermediate coding processes due to the
This scheme is used for encrypt the coding vector for exchangeability of permutation encryption and symbol- level
privacy preserving and provide message content linear combination. 4) Scalability: With the increase of
confidentiality. Random linear network-coding (RLNC) could intermediate nodes, the performance of P-Coding does not
be performed directly on the encrypted coding vectors due to degrade [2].
the homomorphism of HEFs. HEF operation is expensive. So P-coding is efficient in computation and requires minimum
this approach is computational heavyweight and not scalable. energy for encryption decryption operation.
E. P-coding [1][2] Enhanced P-coding scheme [1][2]
P-coding scheme is to perform permutation encryption on P-coding scheme is sufficient for small amount of data. If
coded message. P-coding scheme is consist of three stages: 1) the large volume of data D need to transmit, then first the
Source Encoding, 2) Intermediate recoding and 3) Sink source should divide the data D into generation. If the same
decoding. Fig. 1. shows the operation of p-coding. PEF key is used during the whole transmission, single
Source Encoding: generation failure may occur, in which accidental key
In source encoding, consider source has h message to be disclosure in one generation will compromise the secrecy of
send. First, it prefixes these h message with their the following transmission. This problem can be solved by
corresponding unit vectors, then the source performs linear randomly perturbing the key used in each generation.
combination on these message with randomly chosen LEVs
(Local Encoding Vectors) and get the coded messages. III. COMPARATIVE ANALYSIS
Finally, the source performs permutation Encryption to get the Table 1. Shows the comparative analysis of using network
cipher text. coding vs. without network coding. If we use network coding
Intermediate Recoding: in MANET, then we can achieve less transmission time, less
In intermediate recoding, intermediate node have no energy consumption, high throughput, less packet losses.
knowledge of PEF (Permutation Encryption Function) key. So There are different techniques to provide Security:
it cannot reconstruct source message. It perform recoding on
encrypted message. x P-coding
Sink Decoding: x AES
In sink decoding, sink decodes message by performing x 3DES
permutation decryption. Sink derives the matrix and finally x Homomorphic Encryption Function
performs Gaussian elimination on matrix to recover source
message. Table. 2. Shows the comparison between different types of
encryption scheme. All these techniques provide
confidentiality.

1056
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.

TABLE 1. COMPARATIVE ANALYSIS OF USING NETWORK x 3DES


CODING VS. WITHOUT NETWORK CODING
x Homomorphic Encryption Function
Parameter Using Network Without Network
coding coding Table. 2. Shows the comparison between different types of
encryption scheme. All these techniques provide
Transmission Less More confidentiality.
Time[2] P-coding techniques has no computation overhead, no
space overhead and it is scalable. It takes less encryption time
Energy Less More than all this techniques. It incurs less per byte energy
consumption[2] consumption and gives high throughput.
AES has computation overhead. It takes more encryption
Throughput[4] High Less time than p-coding. It incurs more per byte energy
consumption and gives less throughput than p- coding.
Packet losses[11] less More HEF has computation overhead. It is expensive to
computation and not scalable.
Security[1][2] Yes No 3DES has computation overhead. It takes more encryption
time than AES and p-coding. It gives less throughput than
AES & p-coding.
There are different techniques to provide Security:

x P-coding
x AES
TABLE II. COMPARATIVE ANALYSIS OF ENCRYPTION SCHEME

Encryption scheme P-coding[1][2][4] AES[1][2][4] Homomorphic Encryption 3DES[1][2]


Function[2][5]

Confidentiality Yes Yes Yes Yes

Computational overhead ≈0 O(h.l) O(h3logn) Yes

Space Overhead None None None None

Encryption time 1/3 AES More than p- - More than AES


coding and P-coding

Per byte Energy 0.25μJ[1] 0.8μJ[1] - More than AES


consumption and P-coding

Throughput More than AES Less than p- - Less than AES


&3DES coding & P-coding

IV. CONCLUSION
ACKNOWLEDGEMENT
This paper shows how security can be achieved as well
as energy consumption can be reduced. Also the comparison I thanks to Mr. Fenil Khatiwala, Asst. prof., CE & IT
of different types of encryption scheme is shown. Network Dept., CGPIT, Bardoli for their suggestion and for his
coding technique can reduce energy consumption by less encouragement.
transmission and also achieve some security and high
throughput. P-coding is efficient in computation and incurs REFERENCES
less energy consumption for encryption-decryption and it [1] Zhang, Peng, Chuang Lin, Yixin Jiang, Yanfei Fan, and Xuemin Shen.
provides confidentiality. "A Lightweight Encryption Scheme for Network-Coded Mobile Ad

1057
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.

Hoc Networks." Parallel and Distributed Systems, IEEE Transactions [6] Bhosle, Amol, and Yogadhar Pandey. "Applying Security to Data
on 25, no. 9 (2014): 2211-2221. Using Symmetric Encryption in MANET." International Journal of
[2] Zhang, Peng, Yixin Jiang, Chuang Lin, Yanfei Fan, and Xuemin Shen. Emerging Technology and Advanced Engineering 3, no. 1 (2013).
"P-coding: secure network coding against eavesdropping attacks." [7] Sonali Kulkarni, M. S. Chaudhari, “ An Energy Efficient Encryption
InINFOCOM, 2010 Proceedings IEEE, pp. 1-9. IEEE, 2010. scheme for Secure transmissions in Mobile Ad-hoc Networks,”
[3] Pallavi s., Santhosh G., “Enhanced P - Coding: An Energy Saving International journal of Advanced Research in Computer Science and
Encryption scheme for Mobile Ad – hoc Networks,” International Software Engineering, Vol. 4, Issue 9, September 2014.
Journal of Advance Research in Science and Engineering IJARSE, [8] Ahlswede, Rudolf, Ning Cai, Shuo-Yen Robert Li, and Raymond W.
Vol. No. 3, Issue No. 6, June 2014. Yeung. "Network information flow." Information Theory, IEEE
[4] Madhavan, P., J. Nandhini, N. Nandhini, and P. Malathi. "Energy Transactions on 46, no. 4 (2000): 1204-1216.
Optimization in MANET using Modified P-Coding scheme," [9] Mohsin Khan, Sadaf Hussain, Malik Imran, “Performance Evaluation
International Journal of Science, Engineering and Technology of Symmetric Cryptography Algorithms: A Survey,” International
Research, Vol. 3, Issue 4, April 2014. Journal of Information technology and Electrical Engineering,
[5] Fan, Yanfei, Yixin Jiang, Haojin Zhu, and Xuemin Sherman Shen. "An Vol. No. 2, Issue No. 2, April 2013.
efficient privacy-preserving scheme against traffic analysis attacks in [10] Priyanka Sogani, Aman Jain, “A Survey on Security Issues in
network coding." In INFOCOM 2009, IEEE, pp. 2213-2221. IEEE, Mobile Ad - hoc Networks,” International Journal of Innovations &
2009. Advancement in Computer Science, Vol. 4, March 2015.

1058

Вам также может понравиться