Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Print
PDF
IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)
© 2012 by IJCA Journal
icwet2012 - Number 6
Year of Publication: 2012
Authors:
Prasad Patil
Rinku Shah
Kajal Jewani

Prasad Patil, Rinku Shah and Kajal Jewani. Article: Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012) icwet(6):1-5, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Prasad Patil and Rinku Shah and Kajal Jewani},
	title = {Article: Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS},
	journal = {IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)},
	year = {2012},
	volume = {icwet},
	number = {6},
	pages = {1-5},
	month = {March},
	note = {Full text available}
}

Abstract

In recent years, a lot of research is focused on wireless adhoc network, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the adhoc networks in security. Transmission of extremely sensitive information via one single path is not advisable as the information can easily be lost or hacked if the individual path is not fully trusted. To avoid this threat sender may want to send multiple copies through multiple disjoint paths. But this increases the risk of information leakage. Shared cryptography tries to address this concern. In this paper Novel Security Scheme for Wireless Adhoc Networks (NSS) is studied and some serious drawbacks of NSS have been realized. To overcome these drawbacks, Enhanced Novel Security Scheme (ENSS) is proposed. Classical approaches of secret sharing have high computational complexity. While proposed approach (ENSS) provides high security with moderate computational complexity results in less power consumption.

References

  • Supachote Lertvorrathan, INTEGRATED SECURE MULTIPATH MOBILE ADHOC NETWORK, School of applied Statistics National Institute of Development 2010.
  • A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  • Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A survey on attacks and countermeasures in mobile ad hoc networks”, Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006.
  • “Security issues in MANET”,Rashid Sheikh,Mahakal Singh Chandel,Durgesh Kumar Mishra, 978-1-4244-7202-4/10 IEEE 2010.
  • Y. Desmedt “Some recent research aspects of threshold cryptography” Proc of ISW’97 1st International Information Security Workshop vol.1196 of LNCS pp 158-173 Springer-Verlag 1997
  • Y. Desmedt and Y. Frankel “Threshold cryptosystems” Proc of CRYPTO’89 volume 435 of LNCS, pp 307-315 Springer Verlag 1990
  • A. Shamir: “How to share a secret?” Comm ACM, 22(11): pp612-613, 1979.
  • G. Blakely : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  • C. Asmuth and J. Bloom :”A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):pp 208-210, 1983.
  • Revest R, Shamir A and Adelman L, “ A Method for Obtaining Digital Signature and Public Key Cryptosystem” Communication of the ACM, pp. 120- 126,1978.
  • Authentication in Adhoc Networking,A O Salako, University college , London