Authentication in Mobile Ad Hoc Network for Secure Communication
نویسنده
چکیده
For wireless applications the main concern is security. The provisions done for securing the application become bottleneck for widely deployed wireless applications as they affect efficiency. Wireless channels need to be secure. Also it becomes bottleneck because wireless bandwidth is a constrained resource. To achieve security according to the available resource without affecting efficiency is desirable. In particular, mobile adhoc networks (MANETs) based on cooperative communication present significant challenges to security issues, as well as issues of network performance and management. In this paper, we focus on authentication and topology control for mobile ad hoc network. TESLA scheme is proposed to improve the throughput. The scheme proposed works well where no prior information about network is available i.e., for dynamic environment. Results show that our scheme has a capacity to substantially improve throughput in MANETs.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Novel Architecture for Authentication and Secure Communication in VANET
Authenticate communication model provides secure inter and intra vehicles communication. This architecture uses the concept of distributed database. Every driver has to prove his identity to certified authority to get the communication rights to communicate with other vehicles. Vehicular ad-hoc network for intelligent transport system (ITS) which has become an essential service, provides safety...
متن کاملKerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmission power of each node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another. However, this implied trust relationship can be threatened by malicious n...
متن کاملMultifold node authentication in mobile ad hoc networks
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data ...
متن کاملA Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...
متن کاملSurvey of Secure Communication Techniques in Mobile Ad-hoc Network
A Mobile ad hoc Network is an autonomous network comprised of free roaming nodes which communicate wireless by radio transmission. One of the main challenges in MANETs is the design of efficient and light-weight security algorithms that can be handled by devices with limited computational capabilities. Efficiency, reliability and security are (competing) design goals for algorithms suitable for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015