Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network
10.5120/4416-6136 |
Mukesh M B Krishnan and Dr. Sheik Abdul P Khader. Article: Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network. International Journal of Computer Applications 35(7):35-38, December 2011. Full text available. BibTeX
@article{key:article, author = {M. B. Mukesh Krishnan and Dr. P. Sheik Abdul Khader}, title = {Article: Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network}, journal = {International Journal of Computer Applications}, year = {2011}, volume = {35}, number = {7}, pages = {35-38}, month = {December}, note = {Full text available} }
Abstract
Securing End to End Communication in mobile ad-hoc networks are difficult than the ones for fixed, while the security requirements are same namely availability, confidentiality, integrity, authentication and non repudiation. The difference occurs due to system constraints in mobile devices and frequent topology changes in the network. System constraints include low power architecture, small memory, limited bandwidth and limited battery power exhaustion. This paper is focus on the design and analysis a security solution for Mobile ad – hoc Network (MANET) through the authentication data encryption model. The model is analyzed under various attacks and the result shows that the proposed model is highly resistant to attack in end to end communication.
References
- Tseng, Y. Min., A heterogeneous-network aided public-key management scheme for MANETS. Published in Wiley InterScience, Int. J. Net. Mgmt v.17: pp.3–15 2006
- Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks, the 27th Australasian computer science conference 2004
- Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications; 27(5): 488–501. 2004
- Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, 85–91 October 2007
- Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: ICST Mobimedia 2009, London, UK, September 7-9,(2009
- Mahajan, V., Natu, M., Sethi, A.S.: Analysis of Wormhole Intrusion Attack in MANETs. In: Proc. IEEE Military Communication Conference,2008.
- Advanced Encryption Standard: J¨org J. Buchholz http://buchholz.hs-bremen.de December 19, 2001
- vocal Technologies, Ltd. http://www.vocal.com
- SEC 1: Elliptic Curve Cryptography: Certicom Research Contact: secg- This e-mail address is being protected from spambots. You need JavaScript enabled to view it September 20, 2000 Version 1.0
- Kristin Lauter: The Advantages of Elliptic Curve Cryptography for wireless Security, Microsoft corporation, IEEE Wireless Communications • February 2004
- Elisabeth Oswald: Introduction to Elliptic Curve Cryptography, Institute for Applied Information Processing and Communication A-8010 Inffeldgasse 16a, Graz, Austria, July 29, 2005.
- RFC 3588. Diameter Base Protocol, P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, September 2003.
- RFC 3748. Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Lefkowetz, June 2004.
- R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems Based on Pairins, The 2000 Symposium on Cryptography and Information Security, 2000.
- A.O. Salako. Authentication in Ad hoc Networking, In Proceedings of London Communications Symposium 2002 .
- K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks, International Conferenc on Network Protocols (ICNP), 2002.