Simulation of Elliptical Curve Cryptography in IPSec on Ad-Hoc Networks

Authors

  • Hamad Althobaiti Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Saudi Arabia Author
  • Ahmed Adas Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Saudi Arabia Author

DOI:

https://doi.org/10.26417/687zrj13

Keywords:

MANET, ECC, AODV, NS-2, QoS

Abstract

Ad-hoc networks have gained significant attention in the realm of communication due to the proliferation of mobile and IoT devices and wireless networks. Ad hoc Networks offer a decentralized approach, where each node can function as a router and a terminal. Ensuring data safety and integrity in Ad hoc Networks remains a challenge, necessitating the use of robust security mechanisms. This research focuses on the simulation of Elliptical Curve Cryptography (ECC) in the IPsec protocol on ad-hoc networks. ECC, known for its strong security and smaller key sizes, provides an effective means of protecting data packets from potential attacks. The Ad hoc On Demand Multipath Distance Vector (AODV) routing protocol is employed for secure data transmission in a Ad hoc Networks. The main objective is to maintain packet security in the face of hostile environments and active adversaries. Furthermore, the results obtained from the NS-2 simulator are compared with  Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA). Evaluation metrics such as Quality of Service (QoS), average processing time, and average end-to-end delay are utilized. This study addresses the challenges faced by ad-hoc networks in an increasingly digital world. By exploring the implementation of ECC-based cryptography, it contributes to the development of secure communication protocols in ad-hoc networks. The findings offer insights into the efficacy of ECC in protecting data transmission and its comparative performance with other cryptographic techniques. Ultimately, this research aims to advance secure communication protocols, ensuring reliable data exchange in diverse applications and scenarios.

Downloads

Published

2023-04-04

Issue

Section

Articles