Research Article
Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System
| Authors | Cryptographic approach | Security services | Key management | Key size | MANET routing protocol | Attacks considered | Performance metrics |
| Ahmad and Ismail [5] | Selective encryption approach (symmetric) | (i) Confidentiality | No | 128 bits | AODV | — | (i) Encryption time (ii) Data transfer rate (iii) Throughput | Echchaachoui et al. [6] | Asymmetric | (i) Confidentiality | Yes | — | OLSR-SDK | (i) Blackhole attack (ii) DDOS attack | (i) PDR (ii) End-to-end delay | Khan et al. [7] | PPE scheme | (i) Confidentiality | Yes | 32 bits | DSR | (i) Adversarial attack | (i) Throughput (ii) Encryption time (iii) Energy consumption | Hamamreh et al. [8] | RAD protocol (MD5 and DH) | (i) Authentication (ii) Confidentiality (iii) Data integrity | No | 128 bits | DYMO | — | (i) Avg. throughput (ii) PDR (iii) End-to-end delay | Vanathy and Ramakrishnan [9] | KEHECCS | (i) Authentication (ii) Confidentiality | Yes | 52 bits | — | (i) Key compromise attack | (i) Storage cost (ii) Communication overhead (iii) Throughput |
|
|