International Journal of Smart Sensor and Adhoc Network IJSSAN

ISSN: 2248-9738

ijcct journal

Abstracting and Indexing

Crossref logo
IIMT Bhubaneswar

IJSSAN

EFFICIENT AND SECURE AUTHENTICATION BY USING 3-PATH TRANSMISSION IN AD HOC NETWORKS


VETRI SELVI . S
Dept of Computer Science and Engineering, GKM College of Engineering and Technology, Chennai, India.,

PURUS HOTHAMAN
Dept of Computer Science and Engineering, GKM College of Engineering and Technology, Chennai, India.,


Abstract

Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and management of ad-hoc networks is significantly a challenging one when compared to contemporary networks. Authenticating the multicast session is an important one. To authenticate several factors should be considered, major issue are resource constraints and the wireless links. In addition to being resource efficient and robust, security solution must be provides to large group of receivers and to long multi-hop paths. The authentication must be done without much delay and should independent of the other packets. In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks. It exposed network clustering to reduce the overhead and to improve the scalability. Its two tired hierarchy combines the time and secretinformation asymmetry to achieve the resource efficiency and scalability. In the proposed system, a Asynchronous authentication scheme as using shared key management is proposed to resolve the foremost conflicting security requirements like group authentication and conditional privacy. The proposed batch verification scheme as a part of the protocol poses a significant reduction within the message delay, then by using shared key process so requirement of the storage management is extremely less

Recommended Citation

[1] F. Richard Yu, Helen Tang, Peter C. Mason, and Fei Wang, “A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks”, IEEE Transactions on Network and Service Management, Vol. 7, No. 4, December 2010. [2] Leonid Reyzin, and Natan Reyzin, “Better than BiBa short one-time signatures with fast signing and verifying”, October 17, 2007. [3] Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Song, IBM T.J. Watson and UC Berkeley, “Efficient Authentication and Signing ofmulticast streams lossy channels”, perrig,tygar,dawnsong@cs.berkeley.edu, canetti@watson.ibm.com. [4] M.F. Younis, K. Ghumman, M. Eltoweiisy, “Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, Aug. 2006, pp. 865-882. [5] Moustafa A. Youssef, Adel Youssef, Mohamed F. Younis, “Overlapping Multihop Clustering for Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 20, NO. 12, December 2009. [6] Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong ,“Talking To Strangers Authentication in AdHoc Wireless Networks”, balfanz,smetters,stewart,hcwong@parc.xerox.com [7] Adrian Perrig, “The BiBa one-time signature and broadcast authentication”, University of California, Berkeley, perrig@cs.berkeley.edu [8] Mohamed Younis and Osama Farrag, “TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks” at IEEE Transactions on Network and Service Management Vol. 9, No. 1, pages 100-113, March 2012. [9] Yunhao Liu, Jinsong Han, and Jilong Wang, “Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems” at IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 3, pages 464-475, March 2011. [10] Adrian Perrig, Ran Canetti, Dawn Song, J. D. Tygar, “Efficient and Secure Source Authentication for Multicast” perrig,dawnsong,tygar@cs.berkeley.edu, canetti@watson.ibm.com. [11] Reza Azarderskhsh and Arash Reyhani-Masoleh, “Secure Clustering and Symmetric Key Establishment in Heterogeneous WSNs”, Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011, Article ID 893592, pages 1- 12, October 2010. [12] Shuhui Yang, Jie Wu, Jiannong Cao, “Connected k-Hop Clustering in AdHoc Networks”, sjcao@comp.polyu.edu. hk syang1@fau.edu,jie@cse.fau.edu [13] Edith C.H. Ngai and Michael R. Lyu “An Authentication Service Based on Trust and Clustering in WSNs”, Department of Computer Science and Engineering, The Chinese University of Hong Kong{chngai, lyu}@cse.cuhk.edu.hk [14] Dewan Tanvir Ahmed, ” Multicasting in Ad Hoc Networks” University of Ottawa dahmed@site.uottawa.ca, 2005. [15] Anne Marie Hegland, Eliwinjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, and Pal Spilling,” A Survey of Key Management in Ad Hoc Networks” Attacker” IEEE Communications surveys, The Electronic of Original PeerReviewed Survey Articles, www.comsoc.org/pubs/surveys, Vol.8,No.3, pages 48-66,3 rd Quarter2006. [16] Ossama Younis and Sonia Fahmy, “Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach”, Department of Computer Sciences, Purdue University, pages 1-12. [17] Seung Yi, Robin Kravets, “Key Management for Heterogeneous Ad Hoc Wireless Networks”, Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP’02) 1092-1648/02 $17.00 © 2002 [18] http://www.idsia.ch/~gianni/AntHocNet/anthocnet.html, “The anthocnet routing algorithm for manets

Download pdf viewer for your browser, if the PDF cannot be displayed.