To Improve the Network Security with Less Mobility in MANET

Authors

  • Rashmi Jatain  Research Scholar, CSE Department , Maharishi Dayanand University , Rohtak, Haryana, India

Keywords:

Manet, certificate based cryptography , symmetric key.

Abstract

Infrastructures less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. So an efficient and strong model is required to setup so that various eavesdropping activity can be avoided. Key management is a vital part of security in Manet because the distribution of encryption keys in an authentication manner is a difficult task due to its dynamic nature. As every time nodes leaves or joins it has to regenerate a new session key for maintaining secrecy. In this paper, we have proposed a new key management scheme to improve the network security with less mobility overhead and less key distribution time .

References

  1. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Adv. Cryptology— CRYPTO, vol. 2139, New York, 2001, pp. 213-229.
  2. D. Boneh, B. Lynn, and H. Shacham, Short Signatures From the Weil Pairing, Gold Coast, Australia: Springer -Verlag, 2001, pp. 514-532.
  3. J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo, "A survey of identity-based cryptography," in Proc. 10th Annual Conf. for Australian Unix User’s Group, 2004, pp. 95-102.
  4. Sarkar,B.Kisku,S.Misra and M.S Obaidat"Chinese Remainder Theorem-Based RSA- Threshold Cryptography in MANET using Verifiable Secret Sharing Scheme" IEEE International Conference On Wireless and Mobile Computing, Networking and Communications,2009.
  5. CK.Kaya and A.A.Seluck, "A Verfiable Secret Sharing Scheme Based On the Chinese Remainder Theorem", DOCRYPT 2008,LNCS 5365.
  6. Marc Joye, Pascal Paillier, and Serge Vaudenay, "Efficient Generation of Prime Numbers," CHES 2000, vol. 1965 of LNCS, pp. 340-354, SpringerVerlag, 2000.
  7. Marc Joye, Pascal Paillier, and Serge Vaudenay, "Efficient Generation of Prime Numbers," CHES 2000, vol. 1965 of LNCS, pp. 340-354, Springer-Verlag, 2000.
  8. L. Huang, T. Lai, On the scalability of IEEE 802.11 ad hoc networks, in: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), 2012, pp. 173–182.
  9. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, HanChieh Chao,and Chin- Feng Lai, Member, IEEE, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach ", IEEE systems journal, 2014. 10Elhadi M. Shakshuki, Nan King and Tarek R. Sheltami,"EAACK – A Secure Intrusion Detection System for MANETs "IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO.3, MARCH 2013.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Rashmi Jatain, " To Improve the Network Security with Less Mobility in MANET, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1680-1683, March-April-2018.