Professional Documents
Culture Documents
Amitava Sen
School of Computer Engineering,
KIIT University,
Bhubaneswar-751024, India.
amitava57@gmail.com
I.
(WSN)
DNA
INTRODUCTION
169
RELATED W ORK
IJMER; ISSN: 2277-7881; IF-2.735;IC V:5.16; Vol 3, Issue 3(10), March 2014
III.
PROPOSED ALGORITHM
using
170
IJMER; ISSN: 2277-7881; IF-2.735;IC V:5.16; Vol 3, Issue 3(10), March 2014
IV.
TABLE I.
COMPLEXITY ANALYSIS
After the text Suppose the DNA form of data PTdna have the
length m. Let there be i introns and the average length of
introns be l. So the length of the data after the introns are
spliced from the DNA would be m-i*l. Since one codon
consists of 3 bases so the length of the protein form of data
would be (m-i*l)/3.
It is found that the sender needs to traverse the complete data
once for splicing the introns from the DNA. So the time
complexity of the splicing process is O(m). For translation,
y once leading to complexity
O(m). Hence, the total time complexity of the encryption
process is O(m). At the receiving end, the ciphertext is
traversed once each for both the keys to obtain the plaintext
in linear time with a total time complexity of O(m).
It is analyzed that if some malicious node captures the data
during the transfer between the nodes, it can only get cipher
text. The probability of obtaining plaintext from the
ciphertext is very low even if brute force method is applied.
a from PTamino, 20 amino acids are to be
mapped to 61 codons, thereby leading to 3 possibilities for
every amino acid on an average. So, there would be 3(mi*l)/3 total possible combinations to obtain the correct
-i*l)+1 possible
places for the insertion of intron. Every time an intron is
inserted, the number of possible places for the insertion of
intron also increases by 1. Since there are i introns, so the
total combinations for reverse splicing are (i*(2(mi*l)+i+1)/2), which is of the order O(m). As the number of
introns and their length decreases, the time complexity of
reverse splicing will decrease but the time complexity of
reverse translation will increase. Hence the total possible
combinations for the decryption using brute force are (3(mi*l)/3*3* i*(2(m-i*l)+i+1)/2), which is of order O(3m), thus
requiring very large computational time to decipher the
plaintext. Also, the dynamic nature of nodes does not allow
brute force attacks to become successful due to large number
of possible permutations. Further the brute force attacks fail
in this scenario because the pattern that is to be spliced off
varies with the plaintext.
Data
Set
Size of
Plain Text
(bytes)
10
Size of
Cipher
Text
43
Size of
keys
(bytes)
97
1
2
100
315
1000
10000
TABLE II.
Encryption
Time(ms)
Decription
Time (ms)
243
419
664
244
425
3298
4901
289
463
33324
47511
1283
1384
Data Set
Alphabates only
Different
Character
Set
52
Numerical characters
30
100
Special characters
33
100
Combination of
characters
Combination of
Characters
85
100
Description
4
5
VI.
Decription
Success Rate
in %
100
154
V.
RESULT
[1]
[2]
[3]
[4]
[5]
[6]
171
IJMER; ISSN: 2277-7881; IF-2.735;IC V:5.16; Vol 3, Issue 3(10), March 2014
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Imrich Chlamtac, Marco Conti, and Jenifer J.-N Liu, Mobile Ad Hoc
Networking: Imperatives and Challenges, J. Ad Hoc Networks, Vol. 1,
No. 1, pp. 13 64, 2003.
Samian and Mohd Aizaini Maarof, Securing MANET routing protocol
using trust mechanism, Normalia Postgraduate Annual Research
Seminar 2007, 3-4 July 2007.
www.igd.fhg.de/igd-a8/publications/yer/manet-securityflyer-english.pdf
last accessed on February 26, 2009.
Adhikari, Avishek. "DNA Secret Sharing." Evolutionary Computation,
2006. CEC 2006. IEEE Congress on. IEEE, 2006.
Pramanik, S., & Setua, S. K. (2012, December). DNA cryptography. In
Electrical & Computer Engineering (ICECE), 2012 7th International
Conference on (pp.551-554). IEEE.
Naveen, J. K., P. Karthigaikumar, N. M. Sivamangai, R. Sandhya, and S.
B. Asok. "Hardware implementation of DNA based cryptography." In
Information & Communication Technologies (ICT), 2013 IEEE
Conference on, pp. 696-700. IEEE, 2013.
Adleman, Leonard M. "Molecular computation of solutions to
combinatorial
problems."
SCIENCE-NEW
YORK
THEN
WASHINGTON (1994): 1021-1021.
Djenouri, Djamel, L. Khelladi, and N. Badache. "A survey of security
issues in mobile ad hoc networks." IEEE communications surveys 7.4
(2005).
Shon, Taeshik, et al. "Security architecture for IEEE 802.15. 4-based
wireless sensor network." Wireless Pervasive Computing, 2009. ISWPC
2009. 4th International Symposium on. IEEE, 2009.
Gura, Nils, Arun Patel, Arvinderpal Wander, Hans Eberle, and
Sheueling Chang Shantz. "Comparing elliptic curve cryptography and
RSA on 8-bit CPUs." In Cryptographic Hardware and Embedded
Systems CHES 2004, pp. 119-132. Springer Berlin Heidelberg, 2004.
Hong, Deukjo, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee,
Bon-Seok Koo, Changhoon Lee et al. "Hight: A new block cipher suit
able for low-resource device." In Cryptographic Hardware and Embed
ded Systems-CHES 2006, pp. 46-59. Springer Berlin Heidelberg, 2006.
Standaert, Franois-Xavier, Gilles Piret, Neil Gershenfeld, and JeanJacques Quisquater. "SEA: A scalable encryption algorithm for small
embedded applications." In Smart Card Research and Advanced Applications, pp. 222-236. Springer Berlin Heidelberg, 2006.
Bogdanov, Andrey, Lars R. Knudsen, Gregor Leander, Christof Paar,
Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, and Charlotte
Vikkelsoe. "PRESENT: An ultra-lightweight block cipher." In Cryptographic Hardware and Embedded Systems-CHES 2007, pp. 450-466.
Springer Berlin Heidelberg, 2007.
Singh, Harneet, Karan Chugh, Harsh Dhaka, and A. K. Verma. "DNA
based Cryptography: an Approach to Secure Mobile Networks." Inter
national Journal of Computer Applications 1, no. 19 (2010).
172