Multilevel Security Model using Distributed Keys in MANET

نویسندگان

  • Neha Agrawal
  • Sourabh Singh Verma
چکیده

In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir‟s (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into „n‟ parts and distributed to „n‟ nodes in network. So when user wants his private key to sign message he just requests „t‟ or more key shares from any „t‟ out of „n‟ nodes to reconstruct private key. But t-1 shares can‟t reconstruct the private key. Also, for securing the bandwidth and resources in MANET Shamir identity based cryptosystem and signature scheme is used, where a unique user identity is used as public key for encryption and decryption of messages. So, there is no requirement of certification and distribution of public key. We are proposing this security model for a Two tier ad hoc network architecture.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

An Efficient Attribute Based Schema for Trust and Cluster Based Authentication Mechanism in MANET

A mobile adhoc network is wireless communication network that have been collection of nodes with no fixed infrastructure and are able to discover the nearby node with lack of centralized control .Due to this lack of security issues occurs, so protecting the data or node in the network is essential in MANET. In recent works distributed system are mostly depend on key distribution and management ...

متن کامل

Network Security for MANETS

A mobile ad hoc network (MANET) is a network consisting of a collection of nodes capable of communicating with each other without the help from a network infrastructure. Although security issues in mobile ad hoc networks have been a major focus in the recent years, the development of fully secure schemes for these networks has not been entirely achieved till now. MANETs have a unique characteri...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Avant-garde Security in AODV

MANETs are networks formed by moving nodes. They use wireless communication to speak among them and they do it in an ad hoc manner. MANET is considered as an ideal network model for group communications because of its forte of instant establishment. Since, existence of central servers cannot be expected; nodes need to guarantee their data to reach the destination securely without loss, tamper o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013