To Improve the Network Security with Less Mobility in MANET

Authors(1) :-Rashmi Jatain

Infrastructures less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. So an efficient and strong model is required to setup so that various eavesdropping activity can be avoided. Key management is a vital part of security in Manet because the distribution of encryption keys in an authentication manner is a difficult task due to its dynamic nature. As every time nodes leaves or joins it has to regenerate a new session key for maintaining secrecy. In this paper, we have proposed a new key management scheme to improve the network security with less mobility overhead and less key distribution time .

Authors and Affiliations

Rashmi Jatain
Research Scholar, CSE Department , Maharishi Dayanand University , Rohtak, Haryana, India

Manet, certificate based cryptography , symmetric key.

  1. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Adv. Cryptology— CRYPTO, vol. 2139, New York, 2001, pp. 213-229.
  2. D. Boneh, B. Lynn, and H. Shacham, Short Signatures From the Weil Pairing, Gold Coast, Australia: Springer -Verlag, 2001, pp. 514-532.
  3. J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo, "A survey of identity-based cryptography," in Proc. 10th Annual Conf. for Australian Unix User’s Group, 2004, pp. 95-102.
  4. Sarkar,B.Kisku,S.Misra and M.S Obaidat"Chinese Remainder Theorem-Based RSA- Threshold Cryptography in MANET using Verifiable Secret Sharing Scheme" IEEE International Conference On Wireless and Mobile Computing, Networking and Communications,2009.
  5. CK.Kaya and A.A.Seluck, "A Verfiable Secret Sharing Scheme Based On the Chinese Remainder Theorem", DOCRYPT 2008,LNCS 5365.
  6. Marc Joye, Pascal Paillier, and Serge Vaudenay, "Efficient Generation of Prime Numbers," CHES 2000, vol. 1965 of LNCS, pp. 340-354, SpringerVerlag, 2000.
  7. Marc Joye, Pascal Paillier, and Serge Vaudenay, "Efficient Generation of Prime Numbers," CHES 2000, vol. 1965 of LNCS, pp. 340-354, Springer-Verlag, 2000.
  8. L. Huang, T. Lai, On the scalability of IEEE 802.11 ad hoc networks, in: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), 2012, pp. 173–182.
  9. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, HanChieh Chao,and Chin- Feng Lai, Member, IEEE, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach ", IEEE systems journal, 2014. 10Elhadi M. Shakshuki, Nan King and Tarek R. Sheltami,"EAACK – A Secure Intrusion Detection System for MANETs "IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO.3, MARCH 2013.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1680-1683
Manuscript Number : CSEIT1833697
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Rashmi Jatain, "To Improve the Network Security with Less Mobility in MANET", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1680-1683, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview