skip to main content
10.1145/2393216.2393324acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccseitConference Proceedingsconference-collections
research-article

Authenticity check to provide trusted platform in MANET (ACTP)

Published:26 October 2012Publication History

ABSTRACT

To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform.

References

  1. C. E. Perkins,' Ad Hoc Networking', 1 st edition. Addision- Wesly Professional, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Qiuna Niu, "A Trust-Based Message Encryption Scheme for Mobile Ad-Hoc Networks". Second International Workshop on Computer Science and Engineering, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Wu, B., Wu, J., Fernandez, E., Ilyas, M., and Magliveras, s., 'Secure and Efficient Key Management in Mobile Ad Hoc Wireless Networks'. Journal of Network and Computer Applications (JNCA). Vol. 30, pp. 937--954, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Wong, C., Gouda, M., and Lam, S, 'Secure Group Communications Using Key Graphs'. Proc. of the ACM SIGCOMM'98 conference on Applications, technologies, architectures, and protocols for computer communication, pp 68--79, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Wallner, D. M., Harder, E. J., and Agee, R. C., 'Key Management for Multicast: Issues and architectures'. Internet Draft, draft-wallner-key-arch-01.txt, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Renu Dalal, Manju Khari, and Yudhvir Singh, "Survey of Trust Schemes on Ad-hoc Network" CCSIT 2012, Part I, LNICST 84, pp. 170--180, 2012. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012Google ScholarGoogle Scholar
  7. Steiner, M., Tsudik, G., and Waidner, M.,' Cliques: A New approach to Group Key Agreement'. Proc. of the 18 th international Conference on Distributed Computing Systems (ICDCS'98). Pp.380--387, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Burmester, M. and Desmedt, Y., 'A Secure and Efficient Conference Key Distribution system'. Advances in Cryptology-EUROCRYPT'94, Springer, Berlin. vol. 950. Pp.275--286, 1994.Google ScholarGoogle Scholar
  9. Kim, Y., Perrig, A., and Tsudik, G., 'Simple and Fault tolerant Key Agreement for Dynamic Collaborative Groups'. Proc. of the 7 th ACM Conference on the Computer and Communications Security, pp. 235--244, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. WEI Chu-yuan, 'A Hybrid Group Key Management Architecture for Heterogeneous MANET', Second International Conferences on Network Security, Wireless Communications and Trusted Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Caballero-Gill and C. Herandez-Goya, "Efficient Public Key Certificate Management for Mobile Ad Hoc Networks," EURASIP journal on wireless Communications and networking, vol. 2011, pp.1--10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Behrouz A. Forouzen," 3rd edition Data Communication and Networking", Tata McGraw-Hill Publishing Company Limited, 2004.Google ScholarGoogle Scholar
  1. Authenticity check to provide trusted platform in MANET (ACTP)

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
            October 2012
            800 pages
            ISBN:9781450313100
            DOI:10.1145/2393216

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 October 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader