Hybrid Key Authentication Scheme for Privacy over Adhoc Communication

نویسندگان

چکیده

Since communication signals are publicly exposed while they transmit across space, Ad Hoc Networks (MANETs) where secured is most crucial. Unfortunately, these systems more open to intrusions that range from passive listening aggressive spying. A Hybrid Team centric Re-Key Control Framework (HT-RCF) suggests this research examines private group in Adhoc environments. Each selects a Group Manager oversee the group's members choose manager, and suggested HT-RCF uses Improved Power-Aware Decentralized (I-HPAD) mechanism. The Key Distribution Center (KDC) generates keys distributes them managers (GMs) using base algorithm Rivest Shamir Adleman (RSA). key agreement technique investigated for safe user-user communication. Threats aim exploit node recognized stopped regular transmissions. rekeying procedure started every time enters exits network. findings demonstrate approach outperforms currently used Cluster-based Management terms of power use, privacy level, storage processing time.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Authentication and Key Management Scheme for WSANs

Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security mechanisms would be hard to satisfy the security/cost requirements of all types of nodes. In this paper, we propose an integrated security approach, called Hybrid Security Scheme (HSS). It splits a WSAN into two layers, ...

متن کامل

An Authentication and Key Agreement Scheme with Key Confirmation and Privacy-preservation for Multi-server Environments

In the internet environment, it is desirable for a user to login different servers by keying the same password and using the same smart card. This paper proposes an authentication and key agreement scheme with key confirmation for multi-server environments. Compared with the previous authentication and key agreement schemes for multi-server environments, the new scheme holds many merits. It sat...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Secure Cluster based Self Organized Authentication with Key Management Scheme in Vehicular Adhoc Network

Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...

متن کامل

Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network

A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering trends and technology

سال: 2022

ISSN: ['2231-5381', '2349-0918']

DOI: https://doi.org/10.14445/22315381/ijett-v70i10p203