CFP last date
20 May 2024
Reseach Article

Simulation of Self-Organized Public-Key Management for Ad Hoc Networks

Published on December 2011 by Arifa S Tamboli, Sunita S. Shinde, Shabanam S.Tamboli
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 2
December 2011
Authors: Arifa S Tamboli, Sunita S. Shinde, Shabanam S.Tamboli
038df74f-2fd2-400f-ad7d-c6b7028c7dee

Arifa S Tamboli, Sunita S. Shinde, Shabanam S.Tamboli . Simulation of Self-Organized Public-Key Management for Ad Hoc Networks. Network Security and Cryptography. NSC, 2 (December 2011), 55-59.

@article{
author = { Arifa S Tamboli, Sunita S. Shinde, Shabanam S.Tamboli },
title = { Simulation of Self-Organized Public-Key Management for Ad Hoc Networks },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 2 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 55-59 },
numpages = 5,
url = { /specialissues/nsc/number2/4444-spe021t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Arifa S Tamboli
%A Sunita S. Shinde
%A Shabanam S.Tamboli
%T Simulation of Self-Organized Public-Key Management for Ad Hoc Networks
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 2
%P 55-59
%D 2011
%I International Journal of Computer Applications
Abstract

In this paper we addressed the difficult problem of key management in mobile Ad Hoc networks. A self-organized public-key management scheme is proposed that does not rely on any trusted third party, not even in the network initialization phase. To distribute keys to the neighboring nodes we have taken help of inherent properties of DSDV routing algorithm. To exchange the keys of each node with other node in network, by checking the chain appended with entry & based on trust relationship. We also implemented fault handling strategy. New DSDV results are shown with help of X-graph, NS-2.

References
  1. Self-organized public-key management Adhoc networks by Srdjan Capkun, student member, IEEE, levente Buttya’ n, student member, IEEE, and Jean-Pierre Hubaux, Senior Member IEEE
  2. Key management in Ad Hoc networks by Klas Fokine 2002-09-11
  3. Implementing a New Manet Unicast Routing Protocol in NS2 Francisco J. Ros Pedro M. Ruiz, Dept. of Information and Communications Engineering university of Murica
  4. Locality Driven Key management Architecture for Mobile Ad-hoc Networks. Gang xu and Liviu Iftode Department of Computer Science, Rutgers University.
  5. Distributed Symmetric key Management for Mobile Ad hoc Networks. Aldar C-F. Chan Edwards S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto.
  6. Shared RSA Key Generation In A Mobile Ad hoc Network*. B.Lehane and L.Doyle, D.O’ Mahony, Trinity College Dublin, Ireland.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Network key-management simulation Ns-2 self-organized