Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 35 - Number 7
Year of Publication: 2011
Authors:
M. B. Mukesh Krishnan
Dr. P. Sheik Abdul Khader
10.5120/4416-6136

Mukesh M B Krishnan and Dr. Sheik Abdul P Khader. Article: Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network. International Journal of Computer Applications 35(7):35-38, December 2011. Full text available. BibTeX

@article{key:article,
	author = {M. B. Mukesh Krishnan and Dr. P. Sheik Abdul Khader},
	title = {Article: Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {35},
	number = {7},
	pages = {35-38},
	month = {December},
	note = {Full text available}
}

Abstract

Securing End to End Communication in mobile ad-hoc networks are difficult than the ones for fixed, while the security requirements are same namely availability, confidentiality, integrity, authentication and non repudiation. The difference occurs due to system constraints in mobile devices and frequent topology changes in the network. System constraints include low power architecture, small memory, limited bandwidth and limited battery power exhaustion. This paper is focus on the design and analysis a security solution for Mobile ad – hoc Network (MANET) through the authentication data encryption model. The model is analyzed under various attacks and the result shows that the proposed model is highly resistant to attack in end to end communication.

References

  • Tseng, Y. Min., A heterogeneous-network aided public-key management scheme for MANETS. Published in Wiley InterScience, Int. J. Net. Mgmt v.17: pp.3–15 2006
  • Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks, the 27th Australasian computer science conference 2004
  • Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications; 27(5): 488–501. 2004
  • Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, 85–91 October 2007
  • Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: ICST Mobimedia 2009, London, UK, September 7-9,(2009
  • Mahajan, V., Natu, M., Sethi, A.S.: Analysis of Wormhole Intrusion Attack in MANETs. In: Proc. IEEE Military Communication Conference,2008.
  • Advanced Encryption Standard: J¨org J. Buchholz http://buchholz.hs-bremen.de December 19, 2001
  • vocal Technologies, Ltd. http://www.vocal.com
  • SEC 1: Elliptic Curve Cryptography: Certicom Research Contact: secg- This e-mail address is being protected from spambots. You need JavaScript enabled to view it September 20, 2000 Version 1.0
  • Kristin Lauter: The Advantages of Elliptic Curve Cryptography for wireless Security, Microsoft corporation, IEEE Wireless Communications • February 2004
  • Elisabeth Oswald: Introduction to Elliptic Curve Cryptography, Institute for Applied Information Processing and Communication A-8010 Inffeldgasse 16a, Graz, Austria, July 29, 2005.
  • RFC 3588. Diameter Base Protocol, P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, September 2003.
  • RFC 3748. Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Lefkowetz, June 2004.
  • R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems Based on Pairins, The 2000 Symposium on Cryptography and Information Security, 2000.
  • A.O. Salako. Authentication in Ad hoc Networking, In Proceedings of London Communications Symposium 2002 .
  • K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks, International Conferenc on Network Protocols (ICNP), 2002.