Tuesday, September 23, 2014

Symmetric Key Encryption in Ns2

HI All, Thanks for using my blog , just to explain about the Symmetric key encryption is an algorithm used to encrypt using the cryptography technique and two nodes will share the secret keys (i.e) like an prviate communication and destination node will decrypt it and get the message. The main drawback is comparison of public key. We can implement the ECC algorithm,RSA,DES and triple DES algorithm that will give more security in network . maximum 70 - 80 percent security can be implemented in network using these algorithm in ns2 . Email : clickprasan@gmail.com to see the algorithms and simulation results

24 comments:

  1. plese provide coding for pair wise key establishment in wireless se nsor networks

    ReplyDelete
  2. HI

    Nasrin will def mail you Thanks

    ReplyDelete
  3. hi,
    while executing this program ,i getting this error
    invalid command name "Agent/BoxAgent"
    while executing pls reply some one

    ReplyDelete
    Replies
    1. HI Thanks

      please email me clickprasan@gmail.com so that we can discuss and need to check below codes seems Agent not been declared properly

      Delete
  4. Hi,
    Please email me the code for encryption and decryption using symmetric key

    ReplyDelete
  5. Hi,
    Can you sent to me codes for asymmetric key or elliptic curve cryptography?

    ReplyDelete
  6. can you send me the code..vry urgent pls

    ReplyDelete
  7. Hi Susi,

    Yes sure can you please mail me your base paper and based upon that we can proceed and def code will be shared thanks

    ReplyDelete
  8. Please someone mail me the code for cluster head selection and ECDH algorithm at the earliest.I'm in urgent need

    ReplyDelete
  9. Hi Sham

    As already mailed please let me know, we have numerous algorithm for cluster head, based upon ip, energy so much please let me know exact method focusing on

    ReplyDelete
  10. Hello All,
    Recently I'm working on cluster head selection area. Could you please provide me with the code of the cluster head selection algorithm based upon IP, it's urgent. Thank you in advance.

    Regards,
    Dana
    moni-abodi@hotmail.com

    ReplyDelete
  11. Thanks for using my blog mailed you Please check and let me know the base paper so that based upon the algorithm will help you

    ReplyDelete
  12. hi, can you send me the code..vry urgent pls
    my email revient.ode@gmail.com
    thanks

    ReplyDelete
  13. hello friends, please help me out from these questions and confusion...
    1. can I alter the data flowing in ns2, or can intermediate node compromise the integrity of the message, without the knowledge of sender and receiver.

    2. can I generate exact 64 bit key or 80 bit key, using diffie hellman key generation algorithm.

    3. which layer is better for encryption ??

    4. if i will use, network layer for encrypting the packet.. will IP address also be encrypted... i mean header of IP address will also be encrypted..

    I urgently need solution to above queries.. please reply ASAP

    ReplyDelete
    Replies
    1. HI

      1) Yes you can alter the data flow no prob then only you can observe the calculations
      2) yes you can do it
      3) See all 7 layers will use in the network so mostly use LL and NL
      4) You mean two IP addr reffers to IP will not change only the data can be encrypted if u need ip need to change then you need add proxy in server level

      Delete
  14. This comment has been removed by the author.

    ReplyDelete
  15. your doing a great job presanna, send me code for different wire less channel in ad hoc

    ReplyDelete
  16. mymail id quickmailrajesh@gmail.com

    ReplyDelete
    Replies
    1. HI

      Iam getting failure message so please mail me clickprasan@gmail.com to help you

      Delete
  17. Hi,
    Please can I get the code for ECDH implementation on NS2? I would greatly appreciate. osujiobioma@gmail.com

    ReplyDelete
  18. can I get the tcl script for basic encryption algorithm?

    ReplyDelete
  19. can i get basic encryption/decryption code

    ReplyDelete
  20. can you mail me the code sir(tcl file) . my id divya6priya8@gmail.com

    ReplyDelete
    Replies
    1. HI

      Yes i will but wht code or algorithm you need will def mail you thanks

      Delete

Thanks for using my blog any queries or help please email to clickprasan@gmail.com . Please be careful from spammers .do not reply to any other email address other than mentioned above