Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography
Atul Dubey1
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-6 , Page no. 261-265, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.261265
Online published on Jun 30, 2019
Copyright © Atul Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Atul Dubey, “Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.261-265, 2019.
MLA Style Citation: Atul Dubey "Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography." International Journal of Computer Sciences and Engineering 7.6 (2019): 261-265.
APA Style Citation: Atul Dubey, (2019). Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography. International Journal of Computer Sciences and Engineering, 7(6), 261-265.
BibTex Style Citation:
@article{Dubey_2019,
author = {Atul Dubey},
title = {Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {261-265},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4540},
doi = {https://doi.org/10.26438/ijcse/v7i6.261265}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.261265}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4540
TI - Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Atul Dubey
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 261-265
IS - 6
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
343 | 386 downloads | 179 downloads |
Abstract
Security in the mobile ad hoc network is very challenging task due the open communication, absence of centralized control and authentication mechanism. In order to handle these security and reliability issues in the MANET (Mobile Ad hoc Networks), we have proposed a group digital signature and elective curve cryptography based modified AODV (Ad hoc On Demand Distance Vector Routing) routing protocol which provides authentication and reliable communication. Proposed digital group signature method has group manager which has administrative properties like to regulate the authentication mechanism and to handle the dispute or unauthorized node and it is able to check and verify the other node authenticity. We have tested our method on the basis of packet delivery ration, network throughput and the network load. Our approach will increase the transmission reliability and reduces the packet loss chance in comparison to existing approaches
Key-Words / Index Term
Ad-hoc networks; Security; Digital group signature; Elliptic curve cryptography; Node authentication; AODV
References
[1] Jeenat Sultana; Tasnuva Ahmed2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
[2] N Chaitanya Kumar; Abdul Basit; Priyadarshi Singh; V. Ch. Venkaiah2017 International Conference on Inventive Computing and Informatics (ICICI)
[3] Elbasher Elmahdi, Seong-Moo Yoo and Kumar Sharshembiev, 2018 securing data forwarding against black hole attacks in mobile Ad-hoc network.
[4] Amit Kumar Yogi; Jayesh Surana2016 International Conference on ICT in Business Industry & Government (ICTBIG)
[5] H.S. Chiu And K.S. Lui. DelPHI: Wormhole Detection Mechanism For Ad-Hoc Wireless Networks. In Proceedings International Symposium On Wireless Pervasive Computing, Phuket, Thailand, Jan. 2006.
[6] Ming-Yang Su. Warp: A Wormhole Avoidance Routing Protocol By Anamoly Detection In Mobile Ad-Hoc Networks. Computer Security, Vol.29, March 2010.
[7] F.Stanjano, R.Anderson, “The Resurrecting Duckling: Security Issues for Ubiquitous Computing,” Vol. 35, pp. 22-26, Apr, 2002.
[8] H.L.Nguyen,U.T.Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks,” International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006.
[9] H.Deng, W.Li and D.P.Agrawal, “Routing Security in Wireless Ad-Hoc Networks,” University of Cincinnati, IEEE Communication Magzine, Oct, 2002.
[10] N.Shanti, Lganesan and K.Ramar, “Study of Different Attacks On Multicast Mobile Ad-Hoc Network”.
[11] V.Mahajan, M.Natue and A.Sethi, “ Analysis of Wormhole Intrusion attacks in MANETs,” IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
[12] S. Kannan, T. Maragatham, Attack Detection and prevention methods in Proactive and Reactive Routing protocols, International Business Management 5(3), 2011
[13] Zhang, Lili, et al. "Group signature based privacy protection algorithm for mobile ad hoc network." Information and Automation (ICIA), IEEE International Conference on, 2017.
[14] Falgun Shah and Hitul Patel, “A Survey of Digital and Group Signature”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.6, June- 2016, pg. 274-278.