Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Published on March 2012 by Prasad Patil, Rinku Shah, Kajal Jewani
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 6
March 2012
Authors: Prasad Patil, Rinku Shah, Kajal Jewani
ef53789d-332d-49db-8099-64d40131cf5e

Prasad Patil, Rinku Shah, Kajal Jewani . Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 6 (March 2012), 1-5.

@article{
author = { Prasad Patil, Rinku Shah, Kajal Jewani },
title = { Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 6 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icwet2012/number6/5350-1041/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Prasad Patil
%A Rinku Shah
%A Kajal Jewani
%T Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 6
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

In recent years, a lot of research is focused on wireless adhoc network, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the adhoc networks in security. Transmission of extremely sensitive information via one single path is not advisable as the information can easily be lost or hacked if the individual path is not fully trusted. To avoid this threat sender may want to send multiple copies through multiple disjoint paths. But this increases the risk of information leakage. Shared cryptography tries to address this concern. In this paper Novel Security Scheme for Wireless Adhoc Networks (NSS) is studied and some serious drawbacks of NSS have been realized. To overcome these drawbacks, Enhanced Novel Security Scheme (ENSS) is proposed. Classical approaches of secret sharing have high computational complexity. While proposed approach (ENSS) provides high security with moderate computational complexity results in less power consumption.

References
  1. Supachote Lertvorrathan, INTEGRATED SECURE MULTIPATH MOBILE ADHOC NETWORK, School of applied Statistics National Institute of Development 2010.
  2. A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  3. Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A survey on attacks and countermeasures in mobile ad hoc networks”, Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006.
  4. “Security issues in MANET”,Rashid Sheikh,Mahakal Singh Chandel,Durgesh Kumar Mishra, 978-1-4244-7202-4/10 IEEE 2010.
  5. Y. Desmedt “Some recent research aspects of threshold cryptography” Proc of ISW’97 1st International Information Security Workshop vol.1196 of LNCS pp 158-173 Springer-Verlag 1997
  6. Y. Desmedt and Y. Frankel “Threshold cryptosystems” Proc of CRYPTO’89 volume 435 of LNCS, pp 307-315 Springer Verlag 1990
  7. A. Shamir: “How to share a secret?” Comm ACM, 22(11): pp612-613, 1979.
  8. G. Blakely : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  9. C. Asmuth and J. Bloom :”A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):pp 208-210, 1983.
  10. Revest R, Shamir A and Adelman L, “ A Method for Obtaining Digital Signature and Public Key Cryptosystem” Communication of the ACM, pp. 120- 126,1978.
  11. Authentication in Adhoc Networking,A O Salako, University college , London
Index Terms

Computer Science
Information Sciences

Keywords

Novel security scheme Enhanced Novel security scheme