Abstract
Ad-hoc networks have gained significant attention in the realm of communication due to the proliferation of mobile and IoT devices and wireless networks. Ad hoc Networks offer a decentralized approach, where each node can function as a router and a terminal. Ensuring data safety and integrity in Ad hoc Networks remains a challenge, necessitating the use of robust security mechanisms. This research focuses on the simulation of Elliptical Curve Cryptography (ECC) in the IPsec protocol on ad-hoc networks. ECC, known for its strong security and smaller key sizes, provides an effective means of protecting data packets from potential attacks. The Ad hoc On Demand Multipath Distance Vector (AODV) routing protocol is employed for secure data transmission in a Ad hoc Networks. The main objective is to maintain packet security in the face of hostile environments and active adversaries. Furthermore, the results obtained from the NS-2 simulator are compared with Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA). Evaluation metrics such as Quality of Service (QoS), average processing time, and average end-to-end delay are utilized. This study addresses the challenges faced by ad-hoc networks in an increasingly digital world. By exploring the implementation of ECC-based cryptography, it contributes to the development of secure communication protocols in ad-hoc networks. The findings offer insights into the efficacy of ECC in protecting data transmission and its comparative performance with other cryptographic techniques. Ultimately, this research aims to advance secure communication protocols, ensuring reliable data exchange in diverse applications and scenarios.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: European Journal of Engineering and Formal Sciences
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.