Security in Mobile Ad-hoc Networks

Authors(1) :-Kirti Mittal

PKI has been perceived as a standout amongst the best apparatuses for giving security to dynamic systems. Be that as it may, giving such a framework in specially ad-hoc wireless networks is a testing errand because of their infrastructure less nature. In this paper, we show these difficulties in detail, recognize the necessities for such arrangements, and propose a reasonable PKI benefit for ad-hoc networks. We utilize threshold cryptography to circulate the CA functionality over uniquely chosen nodes in view of the security and the physical attributes of nodes. The chosen nodes that collectively give PKI usefulness are called MOCA (MObile Certificate Authority). Utilizing these MOCAs,we display a productive and compelling communication protocol for communication with MOCAs for certification services. Results from our simulation check the effectiveness and the efficiency of our approach.

Authors and Affiliations

Kirti Mittal
Department of Computer Science, Hindu College of Engineering, Sonipat, Haryana, India

PKI, Security, MANET, Ad Hoc Networks, Threshold Cryptography

  1. J Broch, D. A. Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A Performance Comparison of Multi-HopWireless Ad Hoc Network Routing Protocols. In Proceedings of IEEE/ACM MOBICOM 98.
  2. C E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In The Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, February 1999.
  3. Y Frankel and Y. G. Desmedt. Parallel Reliable Threshold Multisignature. Technical Report TR-92-04-02, Univ. of Wisconsin-Milwaukee, 1992.
  4. Janne Gustafsson, Janne Lassila, and et al. Pki-security in mobile business - case: Sonera smarttrust. Available at citeseer.nj.nec.com/466933.html.
  5. J-P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 01), 2001.
  6. J Broch and D. B. Johnson. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. IETF Internet Draft, October 1999.
  7. V Shoup. Practical Threshold Signatures. In Theory and Application of Cryptographic Techniques, pages 207-220, 2000.
  8. Sthephen Kent and Tim Polk. IETF Public-Key Infrastructure Working Group Charter.
  9. S Yi and R. Kravets. MOCA: Mobile certificate authority for wireless ad hoc networks. In Proceedings of the 2nd Annual PKI Research Workshop (PKI 03), Apr. 2003.
  10. L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, Nov. 1999.

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 596-603
Manuscript Number : CSEIT183589
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Kirti Mittal, "Security in Mobile Ad-hoc Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.596-603, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT183589

Follow Us

Contact Us