CFP last date
20 May 2024
Reseach Article

Multilevel Security Model using Distributed Keys in MANET

by Neha Agrawal, Sourabh Singh Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 24
Year of Publication: 2013
Authors: Neha Agrawal, Sourabh Singh Verma
10.5120/12213-8340

Neha Agrawal, Sourabh Singh Verma . Multilevel Security Model using Distributed Keys in MANET. International Journal of Computer Applications. 70, 24 ( May 2013), 10-18. DOI=10.5120/12213-8340

@article{ 10.5120/12213-8340,
author = { Neha Agrawal, Sourabh Singh Verma },
title = { Multilevel Security Model using Distributed Keys in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 24 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number24/12213-8340/ },
doi = { 10.5120/12213-8340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:41.839187+05:30
%A Neha Agrawal
%A Sourabh Singh Verma
%T Multilevel Security Model using Distributed Keys in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 24
%P 10-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir's (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into 'n' parts and distributed to 'n' nodes in network. So when user wants his private key to sign message he just requests 't' or more key shares from any 't' out of 'n' nodes to reconstruct private key. But t-1 shares can't reconstruct the private key. Also, for securing the bandwidth and resources in MANET Shamir identity based cryptosystem and signature scheme is used, where a unique user identity is used as public key for encryption and decryption of messages. So, there is no requirement of certification and distribution of public key. We are proposing this security model for a Two tier ad hoc network architecture.

References
  1. Joseph P. Macker, M. Scott Corsen, Mobile Ad Hoc Networking and the IETF, Mobile Computing and Communications Review, Volume 2, Number 1.
  2. A. Shamir,1979,"How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613.
  3. Sourabh Singh Verma, Saroj Kr. Lanka, R. B. Patel, 2012, "Precedence Based Preemption and Bandwidth Reservation Scheme in MANET", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 2.
  4. Shamir A 1985. , "Identity-based cryptosystems and signature schemes" In: Blakley GR, Chaum D, editors. Advances in cryptology: proceedings of crypto '84. Lecture Notes in Computer Science, vol. 196. Berlin: Springer-Verlag;,p. 47–53.
  5. M. Michalak, T. Braun,2005 , "Common Gateway Architecture for Mobile Ad-Hoc Networks, " Proc. of the Second Annual Conference on Wireless on-Demand Network Systems and Services (WONS'05) Volume 00, pp 70-75.
  6. Yuan Sun Elizabeth, M. Belding-Royer, Charles E. Perkins,2002, Internet Connectivity for Ad hoc Mobile Networks, International Journal of Wireless Information Networks, Special Issue on Mobile ad hoc Networks(MANETs): Standards, Research, Applications , pp 75-88.
  7. Khaleel Ur Rahman Khan, Prof. A Venugopal Reddy, Rafi U Zaman,2009, An Efficient Integrated Routing Protocol for Interconnecting Mobile Ad Hoc Network and the Internet, International Journal of Computer and Electrical Engineering, Vol. 1, No. 1, 1793-8198.
  8. Aasia Samreen and Seema Ansari,2009, "Certificateless ID-based Authentication using Threshold signature for P2P MANETs", IEEE .
  9. Deng H. Agrawal D,2004, "TIDS: threshold and identity-based security scheme for wireless ad hoc networks," Ad Hoc Networks 2 (3), pp 291-307.
  10. Shubat S. Ahmeda,2011, "ID-Based and Threshold Security Scheme for ad hoc Network", IEEE.
  11. William Stallings,2006, Cryptography And Network Security,Pearson Education.
  12. Behrouz A. Forozan, 2007, Cryptography and Network Security,Tata McGraw-Hill.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature ID Based Signature scheme MANET Secret Sharing Scheme