An Innovative Cryptographical Scheme for Mobile Ad-Hoc Network Security using Certificate less Public key Cryptography
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
A Mobile ad hoc Network (MANET) is a self-governing network comprised of free roaming nodes which communicate wireless by radio transmission. As MANET edge closer toward wide-spread deployment, security issues have become a central concern and are increasingly important. Various security mechanisms have been proposed, widely used, and proven to be effective in wired networks, but no single mechanism provides all the services required in a MANET. Due to certain characteristics of MANETs, some security mechanisms are not applicable to this environment. These certain characteristics of ad hoc networks include: lack of a network infrastructure and online administration, the dynamics of the network topology and node membership, the potential attacks from inside the network. In this paper we have proposed an innovative and secured, ACS (address based cryptography scheme) as a combination of Ad hoc node address and public/Private key cryptography. ACS is a certificate less public key cryptography solution which empowers efficient network-wide secure key update via a single broadcast message. It also provides general information about how to choose the secret key sharing parameters used with public key cryptography to meet desirable levels of security and authentication. Thus, it eliminates the need for certificate-based authenticated public-key distribution essential in conventional public-key management scheme.
Authors and Affiliations
Surbhi Tahanguria*1,
Evaluation of DTN Routing Protocols
In Delay Tolerant Networking (DTN) data can transfer in challenging environments where a fully connected end to end path may never exist between a source and destination. These networks deal with large transmissio...
To Effective Search Of Outsourced Data In Cloud By Using RKS
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which ma...
ANALYSIS AND OPTIMIZATION OF GRAVITY ROLLER CONVEYOR USING ANSYS
The main objective of this study is to explore the analysis of Gravity roller conveyor. This has entailed performing a detailed Study of existing Gravity Roller Conveyor system and optimize the critical part like...
FEATURE EXTRACTION AND CLASSIFICATION OF TWO-CLASS MOTOR IMAGERY BASED BRAIN COMPUTER INTERFACES
Brain-computer interface (BCI) technology provides a means of communication for people with severe movement disability to communicate with the external world using the electroencephalogram (EEG). In this study, we...
THE ROLE OF ISLAMIC FAMILY THERAPY ON THE QUALITY OF THE COUPLE RELATIONSHIP IN IRAN
In recent years many methods offering for family therapy especially for couple relationships. But in some country like Iran because of Islamic matters there are some problems for application these new family therapy meth...