Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network
نویسنده
چکیده
A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for selfmonitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.
منابع مشابه
A JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS
Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...
متن کاملBai’s Secret Sharing Scheme for Highly Secured AOMDV Routing Protocol
-Security in wireless network is of a great concern in the present wireless environment. Security is becoming a much essential part in wireless communication as intruders are very much keen in attacking the transmitted route or any node to steal the da ta packets It is indispensable to provide security to the network from the intruders and their security attacks. In order to provide a secured e...
متن کاملEnhancement of Node Authentication and Security in Mobile ADHOC Network
The wireless networks play major rule in networking field. Routing and mobility are the major problems in mobile ADHOC networks. These problems can be avoided using clustering based authentication of approaches. In these paper describes The implementations of secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes and Q–LEACH based cluster...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملImplication of Secure Micropayment System Using Process Oriented Structural Design by Hash chaining in Mobile Network
The proposed system presents a novel approach of designing a highly secured and robust process oriented architecture for micropayment system in wireless adhoc network. Deployment of any confidential transaction over dynamic nature of wireless adhoc network will strike a high amount of security challenges which is very difficult to identify which poses a great difficulty in designing and effecti...
متن کامل