Public-Key Management System using Hamming Distance for Mobile Ad Hoc Network
نویسندگان
چکیده
Mobile ad-hoc networks have various implementation constraints such as infrastructure-free, non-trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability, and so on, have been arisen in the mobile ad-hoc networks. In this paper, we focus on the authentication of these security issues because it is quietly affected by the characteristics of networks. We propose the public-key management system based on the concept of Hamming distance for mobile ad-hoc network. Particularly, we propose an authentication protocol that improves the certificate repository size of each node as N 2 log and assures to make a trusted certification path from one node to another, using the concept of Hamming distance.
منابع مشابه
Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملEffective Trust Model for Public Key Management in Mobile Networks
Today mobile, wireless and non-static networks are getting more and more important as these are triggering the development of next generation networks to support mobile devices are bridging the border to traditional, static networks such as the internet. In public key storage management problem have arisen, because the key computation is still having high overhead and the potential threats of t...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملSecurity in Wireless Ad Hoc Networks
An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006