Secure Data Packet Transmission in Manet Using Enhanced Identity- Based Cryptography (eibc)

نویسندگان

  • P. Subbulakshmi
  • S. Vimal
چکیده

Mobile ad hoc network (MANET) is a self configuring and self relating wireless network of mobile nodes connected devoid of wires. Due to their unique characteristics such as mobility, dynamic topology and lack of essential infrastructure support, security is more challenging in MANET. So, to enhance the security in MANET, we propose Enhanced Identity-Based Cryptography (EIBC), an efficient key management mechanism uses cryptography concept for encryption and decryption of data packets beside with routing information. EIBC system has secret values which perform similar to the original model secret value. In EIBC, the node calculates the live public key and live private key for verification purpose. Enhanced ID-Base Signature is also used for authentication rationale using signature. After completing verification purpose, the protected channel sends the data packets using Enhanced ID-Based Encryption. In Enhanced ID-Based Encryption, the node sends the packet in an encrypted mode using live public key and the node receives the packet in a decrypted mode using live private key. EIBC achieves a elevated level of security while handling system key refreshment process in an efficient manner. The brute force attack is averted by constructing EIBC. The performance is analyzed when there is security mechanism and when there is no security mechanism. Keywords— Enhanced ID-Based Encryption, Enhanced ID-Base Signature,MANET, key refreshment,brute-force attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Transmission in MANET and Wireless Sensor Network

Security is a major issue in any network, having a secure transmission channel for data transmission or a secure communication path from the source to destination is a challenge in MANET and WSN. In MANET, using threshold digital signature is used in existing key management schemes for network. In wireless sensor networks, a security mechanism based on elliptic curve cryptography is considered ...

متن کامل

Improving Packet Delivery Ratio with Enhanced Confidentiality in Manet

In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet. The number of RREQ packet in the network gets added due to the increased amount of link fail...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Secure Token for Secure Routing of Packet in MANET

Routing of data in the Mobile Adhoc Network(MANET) is the most valuable task in today’s world, as it is used in day to day life from a single individual to large organizations. MANET is a favorite target for attackers because of its unique characteristics dynamic topologies, mobility, limited resources, infrastructure less, no centralized management etc. pose a number of non-trivial challenges ...

متن کامل

S-CRAHN: A Secure Cognitive-Radio Ad-Hoc Network

Cognitive-radio (CR) technology is to solve the spectrum scarcity problem, make accessible supplementary spectrum bands required for the data transmission in mobile ad hoc networks (MANET) and provide an appropriate level of security for CR networks received far less attention than other areas regarding to common key management schemes for MANET as well. Key management and authentication are tw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016