Filters








10,994 Hits in 8.2 sec

An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks

Guojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo
2007 7th IEEE International Conference on Computer and Information Technology (CIT 2007)  
However, its success ratio for authentication may be not high, especially in large-scale Mobile Ad-Hoc Networks (MANETs).  ...  Hence, our scheme overcomes the drawbacks in terms of success ratio for authentication.  ...  The proposed scheme can be used in large-scale mobile ad hoc networks, while most existing authentication schemes can only be used in small or medium-scale mobile ad hoc networks.  ... 
doi:10.1109/cit.2007.55 dblp:conf/IEEEcit/WangWCG07 fatcat:4ik7b7zwabgo7leppz3bogl5hi

Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Protocol Design  
Due to the lack of channel capacity in mobile ad hoc networks a 546 Mobile Ad-Hoc Networks: Protocol Design www.intechopen.com Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance  ...  Related work A detailed survey was presented on key management schemes for mobile ad hoc networks in the previous chapter.  ... 
doi:10.5772/16226 fatcat:sbqpgsved5ewtaw7l3lsioam4a

Trust Establishment in Mobile Ad Hoc Networks: Key Management [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Applications  
Ad hoc networks remain an important part of current and future military communication.  ...  In a hostile environment, such as the battle field, an ad hoc network's distributive architecture eliminates the problem of a vulnerable network host or the loss of the network host.  ...  Trust Establishment in Mobile Ad Hoc Networks: Key Management Trust Establishment in Mobile Ad Hoc Networks: Key Management www.intechopen.com Mobile Ad-Hoc Networks: Applications Mobile Ad-Hoc  ... 
doi:10.5772/12866 fatcat:7kgddqyqazf25gndtrwwwwz5n4

Mobile Ad Hoc Network Security Issues

Tejashree Kokate, Ram Joshi
2014 International Journal of Computer Applications  
This paper studies mobile Ad hoc network technology uses and how it can be used in real life applications.  ...  Due to mobile nature and scalability in mobile ad hoc networks anyone in the network can communicate anytime anywhere. This paper gives quick overview of existing technologies in MANETs.  ...  A mobile ad hoc network, or MANET, is a temporary infrastructure less network, formed by a set of mobile nodes which dynamically establish their own network without any central administration.  ... 
doi:10.5120/18993-0447 fatcat:zzropb2y6zhz3hacwugsmkoq7e

Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

Inderpreet Kaur, A. L N. Rao
2013 International Journal of Computer Applications  
In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services.  ...  In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks.  ...  As a number of devices can join and leave an ad hoc network, group authentication is necessary.  ... 
doi:10.5120/12007-7293 fatcat:vlb7vylzdfdetc6l2hiu4lqite

Modification in the Kerberos Assisted Authentication in Mobile Ad-hoc Networks to Prevent Black Hole Attack

Manpreet Kaur, Tanu Preet Singh, Barjinder Singh
2015 International Journal of Computer Applications  
In this paper, we reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network and added the concept of timers in KAMAN to solve the problem of black hole attack that aroused when Kaman  ...  Due to their unique features mobile ad hoc networks can be deployed anywhere round the clock.  ...  An efficient mechanism to maintain trust relationship between every node in ad hoc networks is mutual authentication.  ... 
doi:10.5120/20694-3585 fatcat:caobelfrxvcjvm6wvearudviqq

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar
2015 International Journal of Computer Applications  
This paper provides an authenticated zero knowledge protocol which is very helpful in establishing secure wireless communication in ad-hoc networks by satisfying cryptographic goals such as authentication  ...  Authentication is necessary in wireless communication such as GSM or for Ad-Hoc purposes [26] .Here Latin word ad-hoc means for the specific purpose only.  ...  system that is essential for communication of ad-hoc networks like in e-commerce and for secure money transaction schemes [12] .  ... 
doi:10.5120/ijca2015906437 fatcat:6fdtnmqejnehtodqdfvgnfdjia

A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks

Deepak Kumar, Vinod Kumar
2016 International Journal of Computer Applications  
The numbers of approaches have been introduced, which focus on the challenges to adapt certificate-based authentication in a distributed way in mobile ad hoc networks.  ...  It's a significantly arduous task to adapt a certificate based authentication protocols for mobile ad hoc networks due to absence of fixed infrastructure or centralized management.  ...  The proposed authentication schemes for ad hoc networks involved certificate-based PKI.  ... 
doi:10.5120/ijca2016909265 fatcat:uqa557z355c3zekhhqtvp6b74i

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Akash Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, Prashant Johri
2017 International Journal of Wireless and Microwave Technologies  
is an issue challenging the effectively functionality of the vehicular ad hoc network.  ...  VANET (Vehicle Ad hoc network) is the sub group of the MANET (Mobile Ad hoc Network) consisting of vehicles as the communication nodes.  ...  The design of TESLA is done basically for the broadcasting authentication in wireless ad-hoc network.  ... 
doi:10.5815/ijwmt.2017.03.04 fatcat:w5hdnxyk4vagfloikm2xxgrb7m

Highly reliable trust establishment scheme in ad hoc networks

Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
2004 Computer Networks  
The lack of initial trust establishment mechanisms in most higher level security solutions (e.g. key management schemes, secure routing protocols) for ad hoc networks makes them benefit from our scheme  ...  Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios.  ...  The scheme is quite effective and scalable for ad hoc networks.  ... 
doi:10.1016/j.comnet.2004.01.008 fatcat:wwn2cgn22jh6zidrddb7xmlhgy

Security Establishment in MANET Systems using FACES

P Manivannan, J. Shakila
2013 International Journal of Science and Engineering Applications  
Friend based Ad-hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad-hoc mobile networks.  ...  Through extensive simulation analysis it was inferred that this scheme provides an efficient approach towards security and easier detection of malicious nodes in the mobile ad-hoc network.  ...  Objective In this paper, we present the design and propose an algorithm to establish secure routing in mobile ad-hoc networks.  ... 
doi:10.7753/ijsea0204.1002 fatcat:wfe5j2c7ybb65hhj22zpc33fze

Authentication Based on Multilayer Clustering in Ad Hoc Networks

Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, Sang Keun Lee, Chong-Sun Hwang
2005 EURASIP Journal on Wireless Communications and Networking  
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks.  ...  Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other  ...  An ID-based public key is suitable in a mobile ad hoc network.  ... 
doi:10.1155/wcn.2005.731 fatcat:2i6rrsrcyba5da4dayhddxlblu

Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS] - Pseudonymous Mobile Ad Hoc Routing Protocol

K. Vinayakan, M. V. Srinath
2018 Indonesian Journal of Electrical Engineering and Computer Science  
It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network.  ...  There are a lot of speculations going on about the interests for privacy in mobile network.  ...  mobility management in Mobile-Ad-hoc Network [18] .  ... 
doi:10.11591/ijeecs.v10.i2.pp763-769 fatcat:blpva6yc2jfndgtzlpwjlyw4qy

Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET

Abubakar M. Baba, Department of Computer Engineering, Kaduna Polytechnic, Kaduna, Nigeria, Simon, T. Apeh, Kachikwu, B. Erameh, epartment of Computer Engineering University of Benin Benin-City, Nigeria, Department of Computer Engineering Kaduna Polytechnic, Kaduna, Nigeria
2021 Advances in Multidisciplinary & Scientific Research Journal Publication  
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication  ...  This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS).  ...  a trust-based management scheme for Mobile Ad Hoc Network a.  ... 
doi:10.22624/aims/abmic2021p12 fatcat:e2mwidlf75el5i32iuqkgpzva4

The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks

A. Rajaram, S. Palaniswami
2010 2010 International Conference on Computational Intelligence and Software Engineering  
In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information.  ...  In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs.  ...  Mobile Ad-hoc Networks An ad-hoc network is a collection of wireless mobile nodes that forms a temporary network without any centralized administration.  ... 
doi:10.1109/wicom.2010.5600904 fatcat:ndgcco3f7jgdjmn5pbw7jwt2b4
« Previous Showing results 1 — 15 out of 10,994 results