CFP last date
22 April 2024
Reseach Article

A XTC based Authentication Scheme for MANET

by Anshul Oza, Madhavi Bharani, Gagan Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 5
Year of Publication: 2017
Authors: Anshul Oza, Madhavi Bharani, Gagan Shukla
10.5120/ijca2017915148

Anshul Oza, Madhavi Bharani, Gagan Shukla . A XTC based Authentication Scheme for MANET. International Journal of Computer Applications. 172, 5 ( Aug 2017), 12-16. DOI=10.5120/ijca2017915148

@article{ 10.5120/ijca2017915148,
author = { Anshul Oza, Madhavi Bharani, Gagan Shukla },
title = { A XTC based Authentication Scheme for MANET },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 5 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number5/28246-2017915148/ },
doi = { 10.5120/ijca2017915148 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:31.611764+05:30
%A Anshul Oza
%A Madhavi Bharani
%A Gagan Shukla
%T A XTC based Authentication Scheme for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 5
%P 12-16
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security Mechanism based on Threshold cryptography that are been implemented for Mobile Ad-hoc Network normally have its own disadvantages or limits. As there should be at least the minimum number of nodes as per been declared in the threshold value to make the system running but there not always the number of nodes according to the threshold value so there is always a chance that system does not work even there is just a single node less than the threshold and even the system is not been compromised that problem can be solved using extended threshold cryptography(XTC). This paper concentrates how to provide a more secure mechanism in MANET using XTC.

References
  1. H Dey and R Datta, “A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network”, CCSIT 2011, Part II, CCIS 132, pp. 400–409, 2011 © Springer-Verlag Berlin Heidelberg 2011
  2. S Tarmizi, P Veeraraghavan, S Ghosh, “Extending the Collaboration Boundary in Localized Threshold Cryptography-Based Schemes for MANETs”, Proc. of the 15 -17 Dec, 2009 IEEE 9th Malaysia International Conference on Comm., Kuala Lumpur Malaysia
  3. P Patil, M. A Rizvi, “Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. II (Jul-Aug. 2014), PP 38-42
  4. M K Parmar, H B Jethva, “Survey on Mobile ADHOC Network and Security Attacks on Network Layer”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 11, November 2013
  5. Dr. Banta Singh Jangra, Manish Kumar Naga, “Study on Security Issues & Challenges in MANET”, PARIPEX – Indian Journal of Research, Volume : 3 | Issue : 4 | April 2014
  6. Ochola EO, Eloff MM, “A Review of Black Hole Attack on AODV Routing in MANET”, ISSA, 2011 - icsa.cs.up.ac.za
  7. Vikas Solomon Abel, “Survey of Attacks on Mobile Ad hoc Wireless Networks”, (IJCSE) ISSN : 0975-3397 Vol. 3 No. 2 Feb 2011
  8. Animesh Patcha and Amitabh Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks”, 0-7803-7829-6/03/$17.00 0 2003 IEEE
  9. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, “A survey of black hole attacks in wireless mobile ad hoc networks”, licensee Springer. 2011, http://link.springer.com/article/10.1186/2192-1962-1-4/fulltext.html
  10. Shree Om and Mohammad Talib, “Wireless Ad-hoc Network under Black-hole Attack”, 2011 ISSN 2225-658X.
  11. Juan-Carlos Ruiz, Jesús Friginal, David de-Andrés, Pedro Gil, “Black Hole Attack Injection in Ad hoc Networks”.
  12. Fan-Hsun Tseng1, Li-Der Chou1 and Han-Chieh Chao, “A survey of black hole attacks in wireless mobile ad hoc networks”, Tseng et al. Human-centric Computing and Information Sciences 2011.
  13. Abder Rahmane Baadache, Ali Belmehdi, “Avoiding Black hole and Cooperative Black hole Attacks in Wireless Ad hoc Networks”, ISSN 1947-5500 (IJCSIS) Vol. 7, No. 1, 2010.
  14. Varsha Patidar, Rakesh Verma, “Black Hole Attack and its Counter Measures in AODV Routing Protocol”, ISSN 2250-3005 Sep. 2012
  15. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”.
  16. Nishant Sitapara, Sandeep B. Vanjale, “Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks, ICETE-201O" on Emerging trends in engineering on 21st Feb 2010.
  17. Kamatchi.V1, Rajeswari Mukesh2,Rajakumar3, “Black Hole Attack Prevention Using random Dispersive Routing For mobile ad hoc Networks”, (Ijans) Vol. 2, No. 4, October 2012.
  18. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato, Abbas Jamalipour, “A survey of routing attacks in mobile ad hoc networks”, 1536-1284/07/$20.00 © 2007 ieee.
  19. S. A. Ade & P. A. Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and Knowledge Management, July-Dec 2010, Volume 2, No. 2, pp. 545-548
  20. Vinay Sridhara, Nagendra Subramanya, “Evaluating Different Techniques to Improve TCP Performance over Wireless Ad Hoc Networks”, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.8842
  21. M. S. karthikeyan, K. Angayarkanni, and Dr. S. Sujatha, “Throughput Enhancement in Scalable MANETs using Proactive and Reactive Routing Protocols”, proceedings of the international multi conference of engineering and computer scientists, Vol II, march 2010.
  22. G Gallegos-Garcia, R Gomez-Cardenas, Gonzalo I. D-Sanchez, “Identity based Threshold Cryptography and Blind Signatures for Electronic Voting”, WSEAS Transactions on Computer, Issue 1, Volume 9, January 2010
  23. P N. Mahalle, N R Prasad and R Prasad, “Novel Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)”, Published in: IEEE ANTS 2013 Seventh IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS)
  24. N Gupta, M Shrivastava, A Goel, “Survey paper on different approaches of Threshold Cryptography”, International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970), Volume-2 Number-3 Issue-5 September-2012
  25. J Al-Muhtadi, R Hill, S Al-Rwais, “Access control using threshold cryptography for ubiquitous computing environments”, Journal of King Saud University – Computer and Information Sciences (2011) 23, 71–78
  26. GSR Emil Selvan, Dr. M. Suganthi, P Jeni, KA Krishna Priya, “Detection of Compromised Nodes in Mobile Ad-Hoc Networks”, Journal of Computational Information Systems 7: 6 (2011) 1823-1829
  27. Ze WANG, Lu LI, Jigang WU, Wei ZOU, “An Efficient Certificateless Key Management Scheme in Mobile Ad Hoc Networks”, Journal of Computational Information Systems 9: 12 (2013) 4787–4794
  28. Lars Lydersen, Nitin Jain, Christoffer Wittmann, ystein Marøy, Johannes Skaar, Christoph Marquardt, Vadim Makarov, and Gerd Leuchs, “Super linear threshold detectors in quantum cryptography”, arXiv:1106.2119v2 [quant-ph] 17 Aug 2011
  29. M. S. A. Mohamad, E. S. Ismail, “A Threshold Authenticated Encryption Scheme Using Hybrid Problems”, Applied Mathematical Sciences, Vol. 8, 2014, no. 31, 1499 – 1507, HIKARI Ltd, www.m-hikari.com, http://dx.doi.org/10.12988/ams.2014.4142
  30. Manuel Koschuch, Matthias Hudler, Michael Kruger, Peter Lory, Jurgen Wenzl, “Optimizing Cryptographic Threshold Schemes For The Use In Wireless Sensor Networks”, DCNET 2011 Position Paper
  31. Rajeswari Mukeshi, V.J.Subashini, “Fingerprint Based Authentication System Using Threshold Visual Cryptographic Technique”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
Index Terms

Computer Science
Information Sciences

Keywords

MANET Exteneded Threshold Cryptography Key Generation