Security in Mobile Ad-hoc Networks
Keywords:
PKI, Security, MANET, Ad Hoc Networks, Threshold CryptographyAbstract
PKI has been perceived as a standout amongst the best apparatuses for giving security to dynamic systems. Be that as it may, giving such a framework in specially ad-hoc wireless networks is a testing errand because of their infrastructure less nature. In this paper, we show these difficulties in detail, recognize the necessities for such arrangements, and propose a reasonable PKI benefit for ad-hoc networks. We utilize threshold cryptography to circulate the CA functionality over uniquely chosen nodes in view of the security and the physical attributes of nodes. The chosen nodes that collectively give PKI usefulness are called MOCA (MObile Certificate Authority). Utilizing these MOCAs,we display a productive and compelling communication protocol for communication with MOCAs for certification services. Results from our simulation check the effectiveness and the efficiency of our approach.
References
- J Broch, D. A. Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A Performance Comparison of Multi-HopWireless Ad Hoc Network Routing Protocols. In Proceedings of IEEE/ACM MOBICOM 98.
- C E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In The Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, February 1999.
- Y Frankel and Y. G. Desmedt. Parallel Reliable Threshold Multisignature. Technical Report TR-92-04-02, Univ. of Wisconsin-Milwaukee, 1992.
- Janne Gustafsson, Janne Lassila, and et al. Pki-security in mobile business - case: Sonera smarttrust. Available at citeseer.nj.nec.com/466933.html.
- J-P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 01), 2001.
- J Broch and D. B. Johnson. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. IETF Internet Draft, October 1999.
- V Shoup. Practical Threshold Signatures. In Theory and Application of Cryptographic Techniques, pages 207-220, 2000.
- Sthephen Kent and Tim Polk. IETF Public-Key Infrastructure Working Group Charter.
- S Yi and R. Kravets. MOCA: Mobile certificate authority for wireless ad hoc networks. In Proceedings of the 2nd Annual PKI Research Workshop (PKI 03), Apr. 2003.
- L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, Nov. 1999.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.