CFP last date
20 May 2024
Reseach Article

Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network

by M. B. Mukesh Krishnan, Dr. P. Sheik Abdul Khader
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 35 - Number 7
Year of Publication: 2011
Authors: M. B. Mukesh Krishnan, Dr. P. Sheik Abdul Khader
10.5120/4416-6136

M. B. Mukesh Krishnan, Dr. P. Sheik Abdul Khader . Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network. International Journal of Computer Applications. 35, 7 ( December 2011), 35-38. DOI=10.5120/4416-6136

@article{ 10.5120/4416-6136,
author = { M. B. Mukesh Krishnan, Dr. P. Sheik Abdul Khader },
title = { Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 35 },
number = { 7 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume35/number7/4416-6136/ },
doi = { 10.5120/4416-6136 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:21:23.778414+05:30
%A M. B. Mukesh Krishnan
%A Dr. P. Sheik Abdul Khader
%T Authenticating and Securing End-To-End Communications through Encrypted Key Model for Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 35
%N 7
%P 35-38
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing End to End Communication in mobile ad-hoc networks are difficult than the ones for fixed, while the security requirements are same namely availability, confidentiality, integrity, authentication and non repudiation. The difference occurs due to system constraints in mobile devices and frequent topology changes in the network. System constraints include low power architecture, small memory, limited bandwidth and limited battery power exhaustion. This paper is focus on the design and analysis a security solution for Mobile ad – hoc Network (MANET) through the authentication data encryption model. The model is analyzed under various attacks and the result shows that the proposed model is highly resistant to attack in end to end communication.

References
  1. Tseng, Y. Min., A heterogeneous-network aided public-key management scheme for MANETS. Published in Wiley InterScience, Int. J. Net. Mgmt v.17: pp.3–15 2006
  2. Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks, the 27th Australasian computer science conference 2004
  3. Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications; 27(5): 488–501. 2004
  4. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, 85–91 October 2007
  5. Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: ICST Mobimedia 2009, London, UK, September 7-9,(2009
  6. Mahajan, V., Natu, M., Sethi, A.S.: Analysis of Wormhole Intrusion Attack in MANETs. In: Proc. IEEE Military Communication Conference,2008.
  7. Advanced Encryption Standard: J¨org J. Buchholz http://buchholz.hs-bremen.de December 19, 2001
  8. vocal Technologies, Ltd. http://www.vocal.com
  9. Kristin Lauter: The Advantages of Elliptic Curve Cryptography for wireless Security, Microsoft corporation, IEEE Wireless Communications • February 2004
  10. Elisabeth Oswald: Introduction to Elliptic Curve Cryptography, Institute for Applied Information Processing and Communication A-8010 Inffeldgasse 16a, Graz, Austria, July 29, 2005.
  11. RFC 3588. Diameter Base Protocol, P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, September 2003.
  12. RFC 3748. Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Lefkowetz, June 2004.
  13. R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems Based on Pairins, The 2000 Symposium on Cryptography and Information Security, 2000.
  14. A.O. Salako. Authentication in Ad hoc Networking, In Proceedings of London Communications Symposium 2002 .
  15. K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks, International Conferenc on Network Protocols (ICNP), 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network End to End Communication Attacks