Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography

نویسنده

  • V. Vijayalakshmi
چکیده

The secure end-to-end route discovery in the decentralized Mobile Adhoc Networks (MANETs) should have to meet the requirements of prevention of DoS attacks on data traffic, should be adaptive and fault tolerant and must have high speed, low energy overhead and scalability for future development. In this research a secure routing using antnet mechanism and mutual authentication using Elliptic Curve Cryptography (ECC) has been proposed to meet the above requirements. The common perception of public key cryptography is that it is not well suited for adhoc networks as they are very complex and slow. Against this popular belief, this research implements Elliptic Curve Cryptography a public key cryptography scheme. ECC provides a similar level of security to conventional integerbased public-key algorithms, but with much shorter keys. Because of the shorter keys ECC algorithms run faster, require less space and consume less energy. These advantages make ECC a better choice of public key cryptography, especially for a resource constrained systems like MANETs. Using the antnet routing algorithm, the highly trustable route will be selected for data transfer and each Mobile Node (MN) in MANET maintains the trust value of its one-hop neighbors. The mutual authentication between source and destination is done by master key exchange using Elliptic Curve Cryptography (ECC).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network

Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbours. Key management is the critical process in sensor nodes to secure the data. Most e...

متن کامل

Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks

In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing homomorphic encryption algorithms. We make use of ElGamal encryption, Elliptic Curve encryption and a privacy homomorphism, which exhibits the property of homomorphism in our new routing protocol. Elliptic curve exhibits ...

متن کامل

Secure Routing Based on ECC in Cluster Wireless Sensor Networks

wireless sensors having limited capabilities, because of these factors sensors possess huge attacks like sinkhole, worm hole, Sybil, flooding, etc. a lot of research work already done, but no one implemented secure routing protocol to mitigate all these attacks. Some proposals came on security of wireless sensor network which controlled only one or two attacks. We proposed Secure Routing in Clu...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks

Ad-hoc networking is a relatively new operating mode for rapid mobile host interconnection. However, it suffers from the lack of a fixed infrastructure that forces each adhoc host to rely on each other, in order to maintain the network stability and functionality. This singularity of adhoc networks introduces several issues, most of which concern the system’s security. This paper focuses on inv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008