## Tuesday, September 23, 2014

### Symmetric Key Encryption in Ns2

HI All,
Thanks for using my blog , just to explain about the Symmetric key encryption is an algorithm used to encrypt using the cryptography technique and two nodes will share the secret keys (i.e) like an prviate communication and destination node will decrypt it and get the message. The main drawback is comparison of public key.
We can implement the ECC algorithm,RSA,DES and triple DES algorithm that will give more security in network . maximum 70 - 80 percent security can be implemented in network using these algorithm in ns2 .
Email : clickprasan@gmail.com to see the algorithms and simulation results

Subscribe to:
Post Comments (Atom)

plese provide coding for pair wise key establishment in wireless se nsor networks

ReplyDeleteHI

ReplyDeleteNasrin will def mail you Thanks

hi,

ReplyDeletewhile executing this program ,i getting this error

invalid command name "Agent/BoxAgent"

while executing pls reply some one

HI Thanks

Deleteplease email me clickprasan@gmail.com so that we can discuss and need to check below codes seems Agent not been declared properly

Hi,

ReplyDeletePlease email me the code for encryption and decryption using symmetric key

Hi,

ReplyDeleteCan you sent to me codes for asymmetric key or elliptic curve cryptography?

can you send me the code..vry urgent pls

ReplyDeleteHi Susi,

ReplyDeleteYes sure can you please mail me your base paper and based upon that we can proceed and def code will be shared thanks

Please someone mail me the code for cluster head selection and ECDH algorithm at the earliest.I'm in urgent need

ReplyDeleteHi Sham

ReplyDeleteAs already mailed please let me know, we have numerous algorithm for cluster head, based upon ip, energy so much please let me know exact method focusing on

Hello All,

ReplyDeleteRecently I'm working on cluster head selection area. Could you please provide me with the code of the cluster head selection algorithm based upon IP, it's urgent. Thank you in advance.

Regards,

Dana

moni-abodi@hotmail.com

Thanks for using my blog mailed you Please check and let me know the base paper so that based upon the algorithm will help you

ReplyDeletehi, can you send me the code..vry urgent pls

ReplyDeletemy email revient.ode@gmail.com

thanks

hello friends, please help me out from these questions and confusion...

ReplyDelete1. can I alter the data flowing in ns2, or can intermediate node compromise the integrity of the message, without the knowledge of sender and receiver.

2. can I generate exact 64 bit key or 80 bit key, using diffie hellman key generation algorithm.

3. which layer is better for encryption ??

4. if i will use, network layer for encrypting the packet.. will IP address also be encrypted... i mean header of IP address will also be encrypted..

I urgently need solution to above queries.. please reply ASAP

HI

Delete1) Yes you can alter the data flow no prob then only you can observe the calculations

2) yes you can do it

3) See all 7 layers will use in the network so mostly use LL and NL

4) You mean two IP addr reffers to IP will not change only the data can be encrypted if u need ip need to change then you need add proxy in server level

This comment has been removed by the author.

ReplyDeleteyour doing a great job presanna, send me code for different wire less channel in ad hoc

ReplyDeletemymail id quickmailrajesh@gmail.com

ReplyDeleteHI

DeleteIam getting failure message so please mail me clickprasan@gmail.com to help you

Hi,

ReplyDeletePlease can I get the code for ECDH implementation on NS2? I would greatly appreciate. osujiobioma@gmail.com

can I get the tcl script for basic encryption algorithm?

ReplyDeletecan i get basic encryption/decryption code

ReplyDeletecan you mail me the code sir(tcl file) . my id divya6priya8@gmail.com

ReplyDeleteHI

DeleteYes i will but wht code or algorithm you need will def mail you thanks