Security in Mobile Ad-hoc Networks

Authors

  • Kirti Mittal  Department of Computer Science, Hindu College of Engineering, Sonipat, Haryana, India

Keywords:

PKI, Security, MANET, Ad Hoc Networks, Threshold Cryptography

Abstract

PKI has been perceived as a standout amongst the best apparatuses for giving security to dynamic systems. Be that as it may, giving such a framework in specially ad-hoc wireless networks is a testing errand because of their infrastructure less nature. In this paper, we show these difficulties in detail, recognize the necessities for such arrangements, and propose a reasonable PKI benefit for ad-hoc networks. We utilize threshold cryptography to circulate the CA functionality over uniquely chosen nodes in view of the security and the physical attributes of nodes. The chosen nodes that collectively give PKI usefulness are called MOCA (MObile Certificate Authority). Utilizing these MOCAs,we display a productive and compelling communication protocol for communication with MOCAs for certification services. Results from our simulation check the effectiveness and the efficiency of our approach.

References

  1. J Broch, D. A. Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A Performance Comparison of Multi-HopWireless Ad Hoc Network Routing Protocols. In Proceedings of IEEE/ACM MOBICOM 98.
  2. C E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In The Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, February 1999.
  3. Y Frankel and Y. G. Desmedt. Parallel Reliable Threshold Multisignature. Technical Report TR-92-04-02, Univ. of Wisconsin-Milwaukee, 1992.
  4. Janne Gustafsson, Janne Lassila, and et al. Pki-security in mobile business - case: Sonera smarttrust. Available at citeseer.nj.nec.com/466933.html.
  5. J-P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 01), 2001.
  6. J Broch and D. B. Johnson. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. IETF Internet Draft, October 1999.
  7. V Shoup. Practical Threshold Signatures. In Theory and Application of Cryptographic Techniques, pages 207-220, 2000.
  8. Sthephen Kent and Tim Polk. IETF Public-Key Infrastructure Working Group Charter.
  9. S Yi and R. Kravets. MOCA: Mobile certificate authority for wireless ad hoc networks. In Proceedings of the 2nd Annual PKI Research Workshop (PKI 03), Apr. 2003.
  10. L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, Nov. 1999.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Kirti Mittal, " Security in Mobile Ad-hoc Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.596-603, May-June-2018.