Security in MANET's by Using Detective Signature Techniques

نویسندگان

  • Gayathri A.
  • P. Narayanasamy
چکیده

Corresponding Author: Gayathri, A. Department of Information Science and Technology, Anna University, Chennai-25, Tamilnadu, India Email: [email protected] Abstract: Mobile Ad-hoc Network (MANET) is one among the fastest growing area in the field of research where security is a vital factor for protecting MANET against attacks, EAACK is an acknowledgement based IDS which is composed of three parts namely, ACK, S-ACK and MRA along with digital signature to provide security against attacks. Till now contemporary technique such as EAACK with watchdog technique are deployed to detect and avoid intruders whereas this technique does not avoid all intruders because it relies on acknowledgement checking and supervisory node. Hence we propose strong and secure cryptographic technique with the help of combining EAACK with dynamic digital signature using TwoFish Cryptographic Algorithm to overcome the mentioned limitations, in order to authenticate and avoid intruders from communication. In this process NS2 is used to simulate and evaluate the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Face Recognition Techniques: A Survey

Face is the index of mind. It is a complex multidimensional structure and needs a good computing technique for recognition. While using automatic system for face recognition, computers are easily confused by changes in illumination, variation in poses and change in angles of faces. A numerous techniques are being used for security and authentication purposes which includes areas in detective ag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCS

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2015