An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks

被引:0
作者
Sahadevaiah, Kuncha [1 ]
Ramakrishnaiah, Nagendla [1 ]
Reddy, P. V. G. D. Prasad [2 ]
机构
[1] Jawaharlal Nehru Technol Univ, Univ Coll Engn, Dept Comp Sci & Engn, Kakinada 533003, Andhra Pradesh, India
[2] Andhra Univ, Coll Engn, Dept Comp Sci & Syst Engn, Visakhapatnam 530003, Andhra Pradesh, India
来源
PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2 | 2016年 / 51卷
关键词
Mobile ad hoc network; Security; Secure communication; Cryptography; Public-private keys; Key management; PUBLIC-KEY MANAGEMENT;
D O I
10.1007/978-3-319-30927-9_48
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like-unavailable central infrastructure services, periodic movable nodes, wireless link unsteadiness, and possible network separations. In this paper, we present a cryptographic key management scheme for secure communications in ad hoc networks. The scheme transmits the data in the presence of security attacks. The scheme provides the scalability of nodes and storage space wherein the nodes makes use of more than one key pair to encrypt and decrypt the messages. The scheme has been executed in Java programming language and empirically valued its efficiency via performance and security assessments. The simulation outcome has shown that the proposed scheme opposes against selfish nodes and takes less key storage space than traditional schemes. The scheme also satisfies the secure communication requirements.
引用
收藏
页码:489 / 497
页数:9
相关论文
共 13 条
  • [1] [Anonymous], 1997, Handbook of Applied Cryptography
  • [2] Mobility helps peer-to-peer security
    Capkun, S
    Hubaux, JP
    Buttyán, L
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (01) : 43 - 51
  • [3] Self-organized public-key management for mobile ad hoc networks
    Capkun, S
    Buttyán, L
    Hubaux, JP
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) : 52 - 64
  • [4] Cheng X., 2006, AD HOC WIRELESS NETW
  • [5] Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
    Choi, Daeseon
    Lee, Younho
    Park, Yongsu
    Jin, Seung-hun
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (11) : 3574 - 3583
  • [6] Dahshan H., 2009, SECURITY COMMUNICATI, V3, P16
  • [7] A review of security in mobile ad hoc networks
    Gandhi, Charu
    Dave, Mayank
    [J]. IETE TECHNICAL REVIEW, 2006, 23 (06) : 335 - 344
  • [8] SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
    He, Wenbo
    Huang, Ying
    Sathyam, Ravishankar
    Nahrstedt, Klara
    Lee, Whay C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) : 140 - 150
  • [9] A survey of secure wireless ad hoc routing
    Hu, YC
    Perrig, A
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 28 - 39
  • [10] Omar M., 2009, RELIABLE FULLY DISTR, P199