Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 4

Abstract

 Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity  of the message traffic become an essential constraint for the operation and management of the network. We  focus on the security problem of protecting the network connectivity between nodes in ad-hoc network. New  nodes start to contribute in the network as guests; they can only become full members with a network signed  certificate after their authenticity has been warranted by some other members. In this paper we introduce  routine of multicast Protocol for tired authentication between the multilevel of ad-hoc network. In this proposed  protocol Central Authority with trilateral authentication for managing key authentication and certification  process which leads to increase the security and reliability of the network.

Authors and Affiliations

S Anjanaa

Keywords

Related Articles

 Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm

 In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...

 An Overview of TRIZ Problem-Solving Methodology and its  Applications

 TRIZ, which is a Russian word that stands for “Theory of Inventive Problem Solving”, is a problemsolving methodology that was invented based on the belief that there are universal principles of invention that &nbsp...

 Test Exude: Approach for Test Case Reduction

 Abstract : Software development is a planned and structured process includes research, new development, modification, re-engineering results in software products. The structure of development of software is SDLC. I...

 Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing

Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party servic...

 A Secure Data Hiding Scheme In Images Using Random Generated Key

 Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of dat...

Download PDF file
  • EP ID EP156776
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

S Anjanaa (2013).  Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions. IOSR Journals (IOSR Journal of Computer Engineering), 10(4), 41-45. https://europub.co.uk/articles/-A-156776