Filters








16,017 Hits in 4.4 sec

Trust Establishment in Mobile Ad Hoc Networks: Key Management [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Applications  
Ad hoc networks remain an important part of current and future military communication.  ...  In a hostile environment, such as the battle field, an ad hoc network's distributive architecture eliminates the problem of a vulnerable network host or the loss of the network host.  ...  in Mobile Ad Hoc Networks: Key Management www.intechopen.com Mobile Ad-Hoc Networks: Applications Trust Establishment in Mobile Ad Hoc Networks: Key Management www.intechopen.com Mobile Ad-Hoc Networks  ... 
doi:10.5772/12866 fatcat:7kgddqyqazf25gndtrwwwwz5n4

SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks

Dieynaba Mall, Karim Konate, Al-Sakib Khan Pathan
2014 2014 International Symposium on Biometrics and Security Technologies (ISBAST)  
The intent of this paper is to propose an enhanced certificate revocation scheme for Mobile Ad hoc Networks (MANETs). Our approach is built on mainly two previously proposed mechanisms.  ...  We prove the efficiency of our approach by performance analysis. Also, we present the security analysis that shows clear gains than the previously proposed schemes. © 2014 IEEE.  ...  networks HEAP: Hop-by-hop efficient authentication protocol for mobile Ad-hoc networks LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks Cited 63 times View at Publisher 20 A  ... 
doi:10.1109/isbast.2014.7013110 dblp:conf/isbast/MallKP14 fatcat:zrlahbosmfhcvmhmlfeph37jva

Challenges and Issues of Cluster Based Security in MANET

Sapna B Kulkarni, Dr.Yuvaraju B N
2016 IOSR Journal of Computer Engineering  
Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without pre-existing infrastructures.  ...  Even though there are various studies on cluster based security in MANET but there is a clear absence of a comprehensive performance study that provides a unified platform for comparing such techniques  ...  Works on Authentication based security Cluster based Key Management Scheme for MANET with Authentication A Mobile Ad Hoc Network (MANET) was a self organizing, infrastructure less, multi-hop network.  ... 
doi:10.9790/0661-1804040105 fatcat:bdtg7w7ezfbxrksxbfgbac4x4i

Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks [chapter]

Seok-Lae Lee, In-Kyung Jeun, Joo-Seok Song
2007 Lecture Notes in Computer Science  
This paper presents a method of authenticating the nodes in the ad-hoc network and securely transmitting information in consideration of the characteristics of the mobile ad hoc network.  ...  Unlike fixed networks, mobile ad-hoc networks have diverse characteristics, such as dynamic topologies, bandwidth-constrained links, energy-constrained operation, limited physical security, etc.  ...  Asymmetric cryptography is used when the public-key certificate for an ad-hoc network administrator is issued from the TTP, and when an initial key is installed on each node.  ... 
doi:10.1007/978-3-540-72586-2_96 fatcat:ceksrmdyqnalhiie6su5zqvf5a

Intelligent agents based trusted revocation for securing clustering MANETS

A. Aranganathan, C.D. Suriyakala
2018 APTIKOM Journal on Computer Science and Information Technologies  
To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority  ...  Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication  ...  Acknoledgements The researchers are grateful to SATHYABAMA UNIVERSITY for supporting this work.  ... 
doi:10.11591/aptikom.j.csit.79 fatcat:rgwudma3rfegzkqxdhmfx64nq4

Key Management Schemes in MANET: A Review

Taranpreet Kaur
2018 International Journal for Research in Applied Science and Engineering Technology  
ad hoc networks.  ...  are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment .This paper, present the study on various kinds of key management schemes with their  ...  Secure and Efficient Key Management (SEKM) SEKM is a decentralized key management scheme proposed by Wu and Wu in their paper "Secure and efficient key management in mobile ad hoc networks".  ... 
doi:10.22214/ijraset.2018.1258 fatcat:t3pgxe7eibb73e5ha5in7wh4wa

An Improved Protocol for Proxy Based Certification Authority for MANETs

Bibhudendu Panda, Pabitra Mohan Khilar
2012 International Journal of Smart Sensor and Adhoc Network.  
This paper includes developing framework for proxy based certificate Authority for MANET. Key management is a central aspect for security in mobile ad hoc networks.  ...  In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of the topology.  ...  RELATED WORK In [11] , a secure and efficient key management framework(SEKM) for mobile ad hoc networks is proposed.  ... 
doi:10.47893/ijssan.2012.1058 fatcat:ucmanmhsgbb6nih6r6tegahahq

Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review

Nisha Sharma, Dr.Sugandha Singh
2016 IOSR Journal of Computer Engineering  
MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults.  ...  The producing requests of mobile ad hoc webs (MANETs) have made connected protection subjects method extra important.  ...  of the given characteristics. [1]  Network Infrastructure: MANET has not consist of fixed network ground work in an ad-hoc network.  ... 
doi:10.9790/0661-1804021014 fatcat:rjb25nuj5fee5a5fuzhdxew3ca

A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load [chapter]

Hoang Nam Nguyen, Hiroaki Morino
2005 Lecture Notes in Computer Science  
However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET.  ...  Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems.  ...  Introduction In mobile ad hoc networks (MANET), an ad hoc node operates as not only an end terminal but also an intermediate router.  ... 
doi:10.1007/11596042_93 fatcat:xqxuvp6riffple3jpvcvtn46mu

SRTD-Manet: Secured Routing and Terrific Data Delivery in Mobile Ad-Hoc Networks

C. Lavanya Prabha, Anitha K
2014 IJARCCE  
In this proposed work, we present an efficient and secure key management framework (ESKM) for Mobile Ad-Hoc Networks that builds keys by applying a classified dissemination technique and an elemental multicast  ...  In Mobile Ad-Hoc Networks, the estimation load and complication for key management is mainly subject to limitation of the node's accessible resources and the aggressive personality of network.  ...  CONCLUSION Due to internet connectivity security is an important issue for ad hoc mobile networks.  ... 
doi:10.17148/ijarcce.2017.64136 fatcat:ijb7y4hrsbdzzd63loaztbpnoi

Threshold and identity-based key management and authentication for wireless ad hoc networks

Hongmei Deng, A. Mukherjee, D.P. Agrawal
2004 International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.  
Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves  ...  As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention.  ...  We assume that each mobile node carries an IP address or an identity, which is unique and unchanged during its lifetime in the ad hoc network.  ... 
doi:10.1109/itcc.2004.1286434 dblp:conf/itcc/DengMA04 fatcat:4soms7u37feihfeqydt3icokfi

A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks

Deepak Kumar, Vinod Kumar
2016 International Journal of Computer Applications  
It's a significantly arduous task to adapt a certificate based authentication protocols for mobile ad hoc networks due to absence of fixed infrastructure or centralized management.  ...  The numbers of approaches have been introduced, which focus on the challenges to adapt certificate-based authentication in a distributed way in mobile ad hoc networks.  ...  Many of the symmetric key management systems, for ad hoc networks, found in the literature are intended for Wireless Sensor Networks (WSNs).  ... 
doi:10.5120/ijca2016909265 fatcat:uqa557z355c3zekhhqtvp6b74i

Secure Mobile Computing [chapter]

Dharma P. Agrawal, Hongmei Deng, Rajani Poosarla, Sugata Sanyal
2003 Lecture Notes in Computer Science  
Due to its inherent infrastructure-less and self-organizing properties, an ad hoc network provides an extremely flexible method for establishing communications in situations where geographical or terrestrial  ...  Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available on the wide area network  ...  Additional Security Requirements of Ad Hoc Networks As ad hoc networking is somewhat different from the traditional approaches, designing an efficient security scheme to protect ad hoc networks is confronted  ... 
doi:10.1007/978-3-540-24604-6_26 fatcat:nusqnfs7kjhc5awshzmlkmk2ni

A novel technique for node authentication in mobile ad hoc networks

Srinivas Aluvala, K. Raja Sekhar, Deepika Vodnala
2016 Perspectives in Science  
Various kinds of attacks have been studied in ad hoc networks, but no proper solution found for these attacks.  ...  Mobile ad hoc network is a collection of nodes in mobility that communicate to one another forming a network through wireless links, in which each node acts a router and forward packets to destinations  ...  Introduction A set of mobile nodes communicating together through wireless links to form a network is referred as mobile ad hoc network (MANET) (Wu et al., 2007) .  ... 
doi:10.1016/j.pisc.2016.06.057 fatcat:sost2sfbjzbyveycz5ugllhhda

A Review on Key Management Schemes in MANET

Renu Dalal
2012 International Journal of Distributed and Parallel systems  
Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes.  ...  Mobile ad-hoc network doesn't having centralized infrastructure and due to its basic characteristics this network is very vulnerable to attack.  ...  Web-of-trust relationship is used for certificate path and it is not strongly connected which is not suitable for ad-hoc network [5] .  ... 
doi:10.5121/ijdps.2012.3417 fatcat:colxxtcrn5a65cqowlc6vs7fca
« Previous Showing results 1 — 15 out of 16,017 results