Tuesday, September 23, 2014
Symmetric Key Encryption in Ns2
HI All,
Thanks for using my blog , just to explain about the Symmetric key encryption is an algorithm used to encrypt using the cryptography technique and two nodes will share the secret keys (i.e) like an prviate communication and destination node will decrypt it and get the message. The main drawback is comparison of public key.
We can implement the ECC algorithm,RSA,DES and triple DES algorithm that will give more security in network . maximum 70 - 80 percent security can be implemented in network using these algorithm in ns2 .
Email : clickprasan@gmail.com to see the algorithms and simulation results
Subscribe to:
Post Comments (Atom)
plese provide coding for pair wise key establishment in wireless se nsor networks
ReplyDeleteHI
ReplyDeleteNasrin will def mail you Thanks
hi,
ReplyDeletewhile executing this program ,i getting this error
invalid command name "Agent/BoxAgent"
while executing pls reply some one
HI Thanks
Deleteplease email me clickprasan@gmail.com so that we can discuss and need to check below codes seems Agent not been declared properly
Hi,
ReplyDeletePlease email me the code for encryption and decryption using symmetric key
Hi,
ReplyDeleteCan you sent to me codes for asymmetric key or elliptic curve cryptography?
can you send me the code..vry urgent pls
ReplyDeleteHi Susi,
ReplyDeleteYes sure can you please mail me your base paper and based upon that we can proceed and def code will be shared thanks
Please someone mail me the code for cluster head selection and ECDH algorithm at the earliest.I'm in urgent need
ReplyDeleteHi Sham
ReplyDeleteAs already mailed please let me know, we have numerous algorithm for cluster head, based upon ip, energy so much please let me know exact method focusing on
Hello All,
ReplyDeleteRecently I'm working on cluster head selection area. Could you please provide me with the code of the cluster head selection algorithm based upon IP, it's urgent. Thank you in advance.
Regards,
Dana
moni-abodi@hotmail.com
Thanks for using my blog mailed you Please check and let me know the base paper so that based upon the algorithm will help you
ReplyDeletehi, can you send me the code..vry urgent pls
ReplyDeletemy email revient.ode@gmail.com
thanks
hello friends, please help me out from these questions and confusion...
ReplyDelete1. can I alter the data flowing in ns2, or can intermediate node compromise the integrity of the message, without the knowledge of sender and receiver.
2. can I generate exact 64 bit key or 80 bit key, using diffie hellman key generation algorithm.
3. which layer is better for encryption ??
4. if i will use, network layer for encrypting the packet.. will IP address also be encrypted... i mean header of IP address will also be encrypted..
I urgently need solution to above queries.. please reply ASAP
HI
Delete1) Yes you can alter the data flow no prob then only you can observe the calculations
2) yes you can do it
3) See all 7 layers will use in the network so mostly use LL and NL
4) You mean two IP addr reffers to IP will not change only the data can be encrypted if u need ip need to change then you need add proxy in server level
This comment has been removed by the author.
ReplyDeleteyour doing a great job presanna, send me code for different wire less channel in ad hoc
ReplyDeletemymail id quickmailrajesh@gmail.com
ReplyDeleteHI
DeleteIam getting failure message so please mail me clickprasan@gmail.com to help you
Hi,
ReplyDeletePlease can I get the code for ECDH implementation on NS2? I would greatly appreciate. osujiobioma@gmail.com
can I get the tcl script for basic encryption algorithm?
ReplyDeletecan i get basic encryption/decryption code
ReplyDeletecan you mail me the code sir(tcl file) . my id divya6priya8@gmail.com
ReplyDeleteHI
DeleteYes i will but wht code or algorithm you need will def mail you thanks
This comment has been removed by the author.
ReplyDeletemail me the code thiru.fstpl@gmail.com
ReplyDelete