An Efficient Autonomous Key Management with Verifiable Secret Sharing Schemes for Reduced Communication/Computation Costs in MANET


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


A primary concern in mobile impromptu networks (MANETs) is security. Not like typical infrastructure based mostly wireless networks like, wireless cellular net-works, Mobile ad hoc Networks (MANET) contains speedily deployable, self organizing and self maintaining capability options. Moreover, they will be shaped on the fly as required. Additional issues for MANET’s security arise as a result of its high quality to its users. A number of key management schemes have been proposed for MANETs. Due to the disadvantages in Shamir secret sharing such as distribute erroneous sub shares based on this that message transmission communication cost is increased. To overcome this Verifiable secret sharing schemes are used here. Existing research in key management can only handle very limited number of nodes and are inefficient, insecure, or unreliable when the nodes increases. Here this paper modifies Autonomous key management scheme is proposed to address both for security and efficiency for key management in Mobile Ad hoc Network (MANET). It also reduces communication and computational cost in Ad-Hoc Network and works for large number of nodes
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Mobile Ad Hoc Network; Verifiable Secret Sharing Schemes; Update Operation; Join Operation; Leave Operation; Merge Operation; Partition Operation; Expansion Operation

Full Text:

PDF


References


Renuka, A., Dr.Shet, K.C. ,Hierarchical Approach for Key Management in Mobile Ad hoc Networks. (IJCSIS) International Journal of Computer Science and Information Security,2011.

Bing Wu, Jie Wu¸ Yuhong Dong ,An efficient group key management scheme for mobile ad hoc networks. Int. J. Security and Networks, 2008.

Rubaiyat Islam Rafat, Md. Majharul Haque,Enhancing Security for Mobile Ad Hoc Networks by Using elliptic Curve Cryptography. Institute of Information Technology university OF Dhaka ,2009.

Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T ,Secure distributed key generation for discrete-log based cryptosystem. Proc. of Eurocrypt 99, pp. 295–310, 1999.

Rafat, R.I and Haque, M. , Enhancing security for mobile ad hoc networks by using elliptic curve cryptography. University of Dhaka, (2009).

Merin Francis, Sangeetha, M., Dr. Sabari, A., A survey of key management technique for secure and reliable data transmission in MANET, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013.

Luo, H., Zerfos, P., Kong, J., Lu, S and Zhang, L. ,Self-securing ad hoc wireless network. in Proceedings of IEEE 7th Symposium on Computers and Communications (ISCC ’02), pp. 567-574 , 2002.

McDaniel, P and Jamin, S. ,A scalable key distribution hierarchy, Technical Report CSE-TR-366-98. Electrical Engineering and Computer Science, University of Michigan. 1998.

Devi, M and Chenthur Pandian, S. (2013). An efficient autonomous key management with reduced communication/computation Costs in mobile ad hoc network, Journal of Computer Science 9 (10): 1260-1266, 2013.

Roberto Baldoni, Roberto Beraldi, Leonardo Querzoni,Content-Based Routing in Highly Dynamic Mobile Ad Hoc Networks, Jounal of Pervasive comput. & comm., vol. 1 no. 4. ,2005.

Kyung-Hyune Rhee, Young-Hopark and Genetsudik,A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks, Journal of Information Science And Engineering 21, 415-428, 2005.

Chitra Kiran, N and Dr. Narendra Kumar, G. ,Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2,2012.

Mohit Singh Tomar, Dr. Maneesh Shreevastava,Performance Improvment of TCP in Ad Hoc Network, Journal of Global Research in Computer Science, Volume 3, No. 1, 2012.

Balenson, D., McGrew, D and Sherman, A. ,Key management for large dynamic groups: one-way function trees and amortized initialization, IETF Internet Draft: draft-balens on group key mgmt, 1999,

Kim, Y., Perrig, A and Tsudik, G. ,Communication-efficient group key agreement, “ in Proceedings of IFIP-SEC 2001, pp. 229-244, 2001.

Kim, Y., Perrig, A and Tsudik, G. ,Simple and fault-tolerant key agreement for dynamic collaborative groups, in Proceedings of 7th ACM Conference on Computer and Communications Security , pp. 235-244,2000.

Steiner, M., Tsudik, G and Waidner, M. ,Key agreement in dynamic peer groups, IEEE Transactions on Parallel and Distributed Systems , Vol. 11, pp. 769-780,2000.

Ambika, I., Eswaran, P., Improved token based resource allocation technique for multi-service flows in MANET, (2013) International Review on Computers and Software (IRECOS), 8 (6), pp. 1489-1496.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize