Hybrid Key Authentication Scheme for Privacy over Adhoc Communication
نویسندگان
چکیده
Since communication signals are publicly exposed while they transmit across space, Ad Hoc Networks (MANETs) where secured is most crucial. Unfortunately, these systems more open to intrusions that range from passive listening aggressive spying. A Hybrid Team centric Re-Key Control Framework (HT-RCF) suggests this research examines private group in Adhoc environments. Each selects a Group Manager oversee the group's members choose manager, and suggested HT-RCF uses Improved Power-Aware Decentralized (I-HPAD) mechanism. The Key Distribution Center (KDC) generates keys distributes them managers (GMs) using base algorithm Rivest Shamir Adleman (RSA). key agreement technique investigated for safe user-user communication. Threats aim exploit node recognized stopped regular transmissions. rekeying procedure started every time enters exits network. findings demonstrate approach outperforms currently used Cluster-based Management terms of power use, privacy level, storage processing time.
منابع مشابه
Hybrid Authentication and Key Management Scheme for WSANs
Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security mechanisms would be hard to satisfy the security/cost requirements of all types of nodes. In this paper, we propose an integrated security approach, called Hybrid Security Scheme (HSS). It splits a WSAN into two layers, ...
متن کاملAn Authentication and Key Agreement Scheme with Key Confirmation and Privacy-preservation for Multi-server Environments
In the internet environment, it is desirable for a user to login different servers by keying the same password and using the same smart card. This paper proposes an authentication and key agreement scheme with key confirmation for multi-server environments. Compared with the previous authentication and key agreement schemes for multi-server environments, the new scheme holds many merits. It sat...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSecure Cluster based Self Organized Authentication with Key Management Scheme in Vehicular Adhoc Network
Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...
متن کاملKey Scheduling Scheme for Secured Routing in Wireless Adhoc Network
A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distribute...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of engineering trends and technology
سال: 2022
ISSN: ['2231-5381', '2349-0918']
DOI: https://doi.org/10.14445/22315381/ijett-v70i10p203