By Topic

d-key dynamic encryption - A security enhancement protocol for Mobile Ad Hoc Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Peter H. Yu ; Department of Computer Science and Engineering, Texas A&M University, College Station, USA ; Udo W. Pooch

In this paper, we present an efficient, low-bandwidth cost and security-enhancing data encryption d-key protocol via dynamic re-keying during end-to-end communication. Unlike others, the secret d-key is generated using the previous data as the seed and as next packet encryption; therefore, only valid sender and receiver are able to decrypt the cipher text using the unique d-key in their possession, which prevents sensitive data from being access by unauthorized recipients. In addition, test results indicate d-key protocol can perform as efficiently as a non-security routing protocol while providing stronger data privacy with low computational overhead in data encryption and decryption.

Published in:

2009 First International Conference on Ubiquitous and Future Networks

Date of Conference:

7-9 June 2009