CFP last date
22 April 2024
Reseach Article

A Framework to improve the Network Security with Less Mobility in MANET

by Inderpreet Kaur, A. L. N. Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 167 - Number 10
Year of Publication: 2017
Authors: Inderpreet Kaur, A. L. N. Rao
10.5120/ijca2017914390

Inderpreet Kaur, A. L. N. Rao . A Framework to improve the Network Security with Less Mobility in MANET. International Journal of Computer Applications. 167, 10 ( Jun 2017), 21-24. DOI=10.5120/ijca2017914390

@article{ 10.5120/ijca2017914390,
author = { Inderpreet Kaur, A. L. N. Rao },
title = { A Framework to improve the Network Security with Less Mobility in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 167 },
number = { 10 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume167/number10/27808-2017914390/ },
doi = { 10.5120/ijca2017914390 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:14:29.213238+05:30
%A Inderpreet Kaur
%A A. L. N. Rao
%T A Framework to improve the Network Security with Less Mobility in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 167
%N 10
%P 21-24
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Infrastructures less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. So an efficient and strong model is required to setup so that various eavesdropping activity can be avoided. Key management is a vital part of security in Manet because the distribution of encryption keys in an authentication manner is a difficult task due to its dynamic nature. As every time nodes leaves or joins it has to regenerate a new session key for maintaining secrecy. In this paper, we have proposed a new key management scheme to improve the network security with less mobility overhead and less key distribution time .

References
  1. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proc. Adv. Cryptology—CRYPTO, vol. 2139, New York, 2001, pp. 213-229.
  2. D. Boneh, B. Lynn, and H. Shacham, Short Signatures From the Weil Pairing, Gold Coast, Australia: Springer -Verlag, 2001, pp. 514-532.
  3. J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo, “A survey of identity-based cryptography,” in Proc. 10th Annual Conf. for Australian Unix User’s Group, 2004, pp. 95-102.
  4. Sarkar,B.Kisku,S.Misra and M.S Obaidat “ Chinese Remainder Theorem-Based RSA- Threshold Cryptography in MANET using Verifiable Secret Sharing Scheme” IEEE International Conference On Wireless and Mobile Computing, Networking and Communications,2009.
  5. CK.Kaya and A.A.Seluck, “A Verfiable Secret Sharing Scheme Based On the Chinese Remainder Theorem”, DOCRYPT 2008,LNCS 5365.
  6. Marc Joye, Pascal Paillier, and Serge Vaudenay, “Efficient Generation of Prime Numbers,” CHES 2000, vol. 1965 of LNCS, pp. 340-354, Springer-Verlag, 2000.
  7. Marc Joye, Pascal Paillier, and Serge Vaudenay, “Efficient Generation of Prime Numbers,” CHES 2000, vol. 1965 of LNCS, pp. 340-354, Springer-Verlag, 2000.
  8. L. Huang, T. Lai, On the scalability of IEEE 802.11 ad hoc networks, in: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), 2012, pp. 173–182.
  9. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao,and Chin- Feng Lai, Member, IEEE, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach ", IEEE systems journal, 2014.
  10. Elhadi M. Shakshuki, Nan King and Tarek R. Sheltami, “ EAACK – A Secure Intrusion Detection System for MANETs “IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO.3, MARCH 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Manet certificate based cryptography symmetric keys.