International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 1- January 2016 Providing Mutual Authentication and Light Weight Encryption Schema in Mobile Adhoc Network BhagyaRaju Sanchana1 , Chintada Sunil Kumar 2 1 Final M.Tech Student, 2Asst.professor Dept of CSE, Sarada Institute of Science, Technology and Management (SISTAM), Srikakulam, Andhra Pradesh 1,2 Abstract: Mobile Ad Hoc Networks (MANETs) are important wireless communication paradigms. The mobile and infrastructure less nature of MANETs makes them suitable for collecting emergency data in disastrous areas and performing mission-critical communication in battle fields. A critical issue in MANETs is how to reduce energy consumption and maintain a longer life time for mobile nodes. In this paper we are proposed mainly two concepts for performing mutual authentication of each user in the mobile adhoc network and other concept for performing encryption and decryption of transferring data. Before performing encryption and decryption of data each user will perform the mutual authentication. After that each node will exchange data using data exchange protocol. By considering those concepts we can provide less time complexity for data encryption process and also improve network efficiency. Because by implementing proposed system we can provide light weight encryption process and also reduce number of keys usage in the network. In this paper we can also implement the mutual authentication of each user in the network. By implementing this concept we can reduce time complexity for authentication each node in the mobile adnoc network. So that by implementing those concepts we can reduce number of keys and also improve efficiency of mutual authentication of node. Keywords: Encryption and Decryption, Symmetric keys, mutual authentication, security, data exchange I. Introduction MOBILE Ad Hoc Networks (MANETs) are very important wireless communication. Mobile ad hoc networks (MANETs) is an infrastructure less, dynamic network consisting of collection of wireless mobile nodes that communicates with each other without the use of any centralized authority. Mobile ad hoc network is now becoming interesting research topic in the area of wireless communication. Vehicles in the particular range from a network to communicate with each other without any need of a base station. MANET provide comfort and safety applications such as lane changing, traffic sign violation, weather information, road condition, ISSN: 2231-5381 location of restaurants or fuel station, parking and interactive communication such as internet access [2]. As shown in figure 1 MANET provides multiple services, energy is required. Thus, energy saving is an important issue in Mobile ad hoc network. There are several energy efficient schemes used to overcome this problem [3], [4] and [5]. Many researchers show that network coding can reduce energy consumption in MANET with less transmission [6]. Network coding can be defined as coding performed at a node in a network, where coding means casual mapping from inputs to outputs. Idea behind it is to mix and forward data to output links [7]. A node in the network encodes the packet with the network coding and then forwards it to another node. Network coding requires less energy for this process of encoding. Figure 2 clarify the use of network coding in ad hoc network. Suppose there are six nodes forming hexagon and transmission range of each node reaches to its right and left neighbor. Each message would require four transmissions without network coding. When network coding is used for three messages the total number of nine transmissions are needed, i.e., three transmissions per message. It would save ¼ energy without considering energy required for the process of encryption and decryption. Mobile ad hoc network is the network which provides seamless connectivity between devices when they move with their neighbor wireless nodes. For sending packets it does not have any access point and routers. In a MANET each device is free to move independently, and so it can frequently change its link at any time. MANETs nodes can communicate directly between each other so that MANETs can emerged as a dominant mode of communication at any place. Some of the characteristics of MANETs includes infrastructureless network, dynamic network topology and selforganization etc. In ad hoc networks all nodes are responsible for running the network services meaning that every nodes are also works as a router to forward the networks packets to their destination. Data communication in a MANET differs from that of wired networks in different aspects. The bandwidth availability and computing resources like hardware and battery power are restricted in mobile ad hoc networks. An ad hoc network is a decentralized type of wireless network. The ad hoc http://www.ijettjournal.org Page 37 International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 1- January 2016 network is the network that links with each other for communication having fixed infrastructure. It is made up of multiple nodes connected by links. A MANET can be created either by mobile nodes or by both static and dynamic mobile nodes. Mobile ad hoc network is created by cluster of is a form a Mobile Ad Hoc Network (MANET) is formed. II. RELATED WORK There are two main keying protocols that were proposed in the past to reduce the number of stored keys in each sensor in the network. We refer to these two protocols as the probabilistic keying protocol and the grid keying protocol. In the probabilistic keying protocol [4], each sensor in the network stores a small number of keys that are selected at random from a large set of keys. When two adjacent sensors need to exchange data messages, the two sensors identify which keys they have in common then use a combination of their common keys as a symmetric key to encrypt and decrypt their exchanged data messages. Clearly, this protocol can probabilistically defend against eavesdropping. Unfortunately, the probabilistic keying protocol suffers from the following problem. The stored keys in any sensor x are independent of the identity of sensor x and so these keys cannot be used to authenticate sensor x to any other sensor in the network. In other word, the probabilistic protocol cannot defend against impersonation. In the grid keying protocol [5], [6], [7], and [8], each sensor is assigned an identifier which is the coordinates of a distinct node in a two-dimensional grid. Also each symmetric key is assigned an identifier which is the coordinates of a distinct node in two-dimensional grid. Then a sensor x stores a symmetric key K if the identifiers of x and K satisfy certain given relation. When two adjacent sensors need to exchange data messages, the two sensors identify which keys they have in common then use a combination of their common keys as a symmetric key to encrypt and decrypt their exchanged data messages. The grid keying protocol has two advantages (over the probabilistic protocol). First, this protocol can defend against impersonation (unlike the probabilistic protocol) and can defend against eavesdropping (like the probabilistic protocol). Second, each sensor in this protocol needs to store only O(log n) symmetric keys, where n is the number of sensors in the network. Unfortunately, it turns out that the grid keying protocol is vulnerable to collusion. Specifically, a small gang of adversarial sensors in the network can pool their stored keys together and use the pooled keys to decrypt all the exchanged data messages in the sensor network. This situation raises the following important questions: Is it possible to design a keying protocol, where each sensor stores less than n-1 ISSN: 2231-5381 symmetric keys and yet the protocol is deterministically secure against impersonation, eavesdropping, and collusion. The remaining concepts of this paper are as follows. Section 2 is to specify related work of our proposed system. Section 3 implementation procedure of our proposed system. Section 4 is conclusion of our proposed system. Section 5 is reference of can be specify in this paper. III. PROPOSED SYSTEM In this paper, system describe in MANET Energy saving & security in data is an important issue in MANET. This can be solved by network coding which might reduce energy consumption also by using less transmission this system proposed data sharing using data encryption method. Encryption/decryption cost along with transmission time is factor of energy consumption in wireless network. In MANET unreliable wireless media, mobility, lack of infrastructure is a big challenge. Let n denote the number of sensors in our network. Without loss of generality, we assume that n is an odd positive integer. Each sensor in the network has a unique identifier in the range 0 : : : n-1. We use ix and iy to denote the identifiers of sensors x and y, respectively, in this network. Each two sensors, say sensors x and y, share a symmetric key denoted Kx;y or Ky;x. Only the two sensors x and y know their shared key Kx;y. And if sensors x and y ever become neighbours in the network, then they can use their shared symmetric key Kx;y to perform two functions: 1) Mutual Authentication: Sensor x authenticates sensor y, and sensor y authenticates sensor x. 2) Confidential Data Exchange: Encrypt and later decrypt all the exchanged data messages between x and y. (Note that sensors x and y can become neighbours in the network in two occasions. First, the two sensors x and y could be mobile and their movements cause them to become adjacent to one another. Second, the two sensors could be stationary and they are deployed adjacent to one another.) In the remainder of this section, we show that if the shared symmetric keys are designed to have a “special structure”, then each sensor needs to store only (n+1)=2 shared symmetric keys. But before we present the special structure of the shared keys , we need to introduce two new concepts: “universal keys” and “a circular relation, named below, over the sensor identifiers”. Each sensor x in the network stores a symmetric key, called the universal key of sensor x. The universal key of sensor x, denoted ux, is known only to sensor x. Let ix and iy be two distinct sensor identifiers. (Recall that both ix and iy are in the range 0 : : : n-1, where n is the odd number of sensors in the sensor http://www.ijettjournal.org Page 38 International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 1- January 2016 network.) Identifier ix is said to be below identifier iy iff exactly one of the following two conditions holds: 1) ix < iy and (iy - ix) < n=2 2) ix > iy and (ix - iy) > n=2 The below relation is better explained by an example. Consider the case where n = 5. In this case, the sensor identifiers s are 0, 1, 2, 3, and 4, and we have: _ Identifier 0 is below identifiers 1 and 2. _ Identifier 1 is below identifiers 2 and 3. _ Identifier 2 is below identifiers 3 and 4. _ Identifier 3 is below identifiers 4 and 0. _ Identifier 4 is below identifiers 0 and 1 A MUTUAL AUTHENTICATION PROTOCOL: Before the sensors are deployed in a network, each sensor x is supplied with the following items: 1) One distinct identifier ix in the range 0 : : : n-1 2) One universal key ux 3) (n-1)/2 symmetric keys Kx;y = H(ix | uy) each of which is shared between sensor x and another sensor y, where ix is below iy After every sensor is supplied with these items, the sensors are deployed in random locations in the network. Now if two sensors x and y happen to become adjacent to one another, then these two sensors need to execute a mutual authentication protocol so that sensor x proves to sensor y that it is indeed sensor x and sensor y proves to sensor x that it is indeed sensor y. The mutual authentication protocol consists of the following six steps. Step 1: Sensor x selects a random nonce nx and sends a hello message that is received by sensor y. Step 6: Sensor y computes H(ix | iy | ny | Kx;y ) and compares it with the received H(ix | iy | ny | Kx;y). If they are equal, then y concludes that the sensor claiming to be sensor x is indeed sensor x. Otherwise, no conclusion can be reached. A DATA EXCHANGE PROTOCOL: After two adjacent sensors x and y have authenticated one another using the mutual authentication protocol described in the previous section, sensors x and y can now start exchanging data messages according to the following data exchange protocol. (Recall that nx and ny are the two nonces that were selected at random by sensors x and y, respectively, in the mutual authentication protocol.) Step 1: Sensor x concatenates the nonce ny with the text of the data message to be sent, encrypts the concatenation using the symmetric key Kx;y, and sends the result in a data message to sensor y. x------> y : data(ix, iy, Kx;y(ny | text)) Step 2: Sensor y concatenates the nonce nx with the text of the data message to be sent, encrypts the concatenation using the symmetric key Kx;y, and sends the result in a data message to sensor x. x <----- y : data(iy, ix,Kx;y (nx | text)) Sensors x and y can repeat Steps 1 and 2 any number of times to exchange data between themselves. x------> y : hello(ix; nx) Step 2: Sensor y selects a random nonce ny and sends a hello message that is received by sensor x. x <----- y : hello(iy; ny) Step 3: Sensor x determines whether ix is below iy. Then it either fetches Kx;y from its memory or computes it. Finally, sensor x sends a verify message to sensor y. x------> y : verify(ix, iy, H(ix | iy | ny | Kx;y)) Step 4: Sensor y determines whether iy is below ix. Then it either fetches Kx;y from its memory or computes it. Finally, sensor y sends a verify message to sensor x. X<------ y : verify(iy, ix, H(iy | ix | nx | Kx;y)) Step 5: Sensor x computes H(iy | ix | nx | Kx;y) and compares it with the received H(iy | ix | nx | Kx;y). If ISSN: 2231-5381 they are equal, then x concludes that the sensor claiming to be sensor y is indeed sensor y. Otherwise, no conclusion can be reached. IV. CONCLUSIONS Typically, each sensor in a sensor network with n sensors needs to store n-1 shared symmetric keys to communicate securely with each other. Thus, the number of shared symmetric keys stored in the sensor network is n(n-1). However, the optimal number of shared symmetric keys for secure communication, theoretically, isn2_ = n(n-1)=2. Although there have been many approaches that attempt to reduce the number of shared symmetric keys, they lead to a loss of security: they are all vulnerable to collusion. In this paper, we show the protocols for sensor networks, that needs to store only (n + 1)=2 shared symmetric keys to each sensor. The number of shared symmetric keys stored in a sensor network with n sensors is n(n + 1)=2, which is close to the optimal number of shared symmetric keys for any key distribution scheme that is not vulnerable to collusion. It may be noted that in addition to the low number of keys stored, and the http://www.ijettjournal.org Page 39 International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 1- January 2016 ability to resist collusion between sensors, our keying protocol has two further advantages. Firstly, it is uniform: we store the same number of keys in each sensor. Secondly, it is computationally cheap, and thus suitable for a low-power computer such as a sensor: when two sensors are adjacent to each other, the computation of a shared symmetric key requires only hashing, which is a cheap computation and can be done fast. As our protocol has many desirable properties, such as efficiency, uniformity and security, we call this protocol the best protocol for sensor networks. V. REFERENCES [1 ]. A. Rahim, I. Ahmad, Z. S. Khan, M. Sher, M. Shoaib, A. Javed, R. Mahmood “A Comparative Study of Mobile And Vehicular Ad Hoc Networks,” International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009. [2]. S. Singh, C. Raghavendra, and J. Stepanek, „„PowerAware broadcasting in Mobile Ad Hoc Networks, in Proc. IEEE PIMRC, 1999, pp. 1-10. [3]. J. Wieselthier, G. Nguyen, and A. Ephremides, Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks, Mobile Network. Appl., vol. 6, no. 3, pp. 251-263, June 2001. [4]. B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks Wireless Network, vol. 8, no. 5, pp. 481. [5]. R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, Network Information Flow, IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000. [6]. J.P. Vilela, L. Lima, and J. Barros, „„Lightweight Security for Network Coding, in Proc. IEEE ICC, May 2008, pp. 17501754. Cryptographic Algorithms and Security Protocols,’’ IEEE Trans. Mobile Comput., vol. 5, no. 2, pp. 128-143, Feb. 2006. BIOGRAPHIES: BhagyaRaju Sanchana is student in M.Tech (CSE) in Sarada Institute of Science Technology and Management, Srikakulam, Andhra Pradesh. He has received his B.Tech(CSE) GMRIT, Rajam, Srikakulam. His interesting areas are network security, image processing and web technologies. Chintada Sunil Kumar working as a Asst Professor of CSE in Sarada Institute of Science, Technology and Management (SISTAM), Srikakulam, Andhra Pradesh. He received his M.Tech (CSE) from Jntuk, Kakinada. Andhra Pradesh. His interest research areas are Database management sysytems,Computer Architecture, Image Processing, Computer Networks, Distributed Systems. He published 4 international journals and he was attended number of conferences and workshops. [7] .L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM conference on Computer and communications security (CCS), 2002, pp. 41–47. [8] L. Gong and D. J. Wheeler, “A matrix key-distribution scheme,” Journal of Cryptology, vol. 2, pp. 51–59, January 1990. [9] S. S. Kulkarni, M. G. Gouda, and A. Arora, “Secret instantiation in ad-hoc networks,” Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, vol. 29, pp. 200–215, 2005. [10] A. Aiyer, L. Alvisi, and M. Gouda, “Key grids: A protocol family for assigning symmetric keys,” in Proceedings of IEEE International Conference on Network Protocols (ICNP), 2006, pp. 178–186. [11] E. S. Elmallah, M. G. Gouda, and S. S. Kulkarni, “Logarithmic keying,” ACM Transactions on Autonomic [12]. Systems, vol. 3, pp. 18:1–18:18, December 2008. [13]. L. Li, R. Ramjee, M. Buddhikot, and S.Miller, ‘‘Network Coding- Based Broadcast in Mobile Ad-Hoc Networks,’’ in Proc. IEEE INFOCOM, 2007, pp. 1739-1747. [14] N.R. Potlapally, S. Ravi,A.Raghunathan, andN.K. Jha, ‘‘AStudy of the Energy Consumption Characteristics of ISSN: 2231-5381 http://www.ijettjournal.org Page 40