IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS

MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Theoretical and Applied Information Technology 2017-03, Vol.95 (5), p.1173
Hauptverfasser: Narayana, V Lakshman, Bharathi, C R
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 5
container_start_page 1173
container_title Journal of Theoretical and Applied Information Technology
container_volume 95
creator Narayana, V Lakshman
Bharathi, C R
description MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1882372206</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4321312735</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-3612cdeb6ce63da653b18a63ef83bf5a016b3b1b5d95ec17800046a8bf9920f63</originalsourceid><addsrcrecordid>eNotjUFrwjAYQHPYQOf2HwI7F5J85mtyrG20ZZ2RGpCeJGmTg4zprP7_CdvpwTu890TmXPE8A67ljLxM04kxFEst5wSbymxd43q6KvamomXX75zddMWu7unadvTTrprW0KKitS3p1riD7T72r-Q5-a8pvv1zQdzauLLOWrtpyqLNLlrdMkAuhjEGHCLC6FFC4MojxKQgJOkZx_BQQY5axoHnijG2RK9C0lqwhLAg73_Zy_X8c4_T7Xg636_fj-ORKyUgF4Ih_AJZbDsb</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1882372206</pqid></control><display><type>article</type><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Narayana, V Lakshman ; Bharathi, C R</creator><creatorcontrib>Narayana, V Lakshman ; Bharathi, C R</creatorcontrib><description>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</description><identifier>ISSN: 1817-3195</identifier><language>eng</language><publisher>Islamabad: Journal of Theoretical and Applied Information</publisher><ispartof>Journal of Theoretical and Applied Information Technology, 2017-03, Vol.95 (5), p.1173</ispartof><rights>Copyright Journal of Theoretical and Applied Information Mar 2017</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Narayana, V Lakshman</creatorcontrib><creatorcontrib>Bharathi, C R</creatorcontrib><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><title>Journal of Theoretical and Applied Information Technology</title><description>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</description><issn>1817-3195</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotjUFrwjAYQHPYQOf2HwI7F5J85mtyrG20ZZ2RGpCeJGmTg4zprP7_CdvpwTu890TmXPE8A67ljLxM04kxFEst5wSbymxd43q6KvamomXX75zddMWu7unadvTTrprW0KKitS3p1riD7T72r-Q5-a8pvv1zQdzauLLOWrtpyqLNLlrdMkAuhjEGHCLC6FFC4MojxKQgJOkZx_BQQY5axoHnijG2RK9C0lqwhLAg73_Zy_X8c4_T7Xg636_fj-ORKyUgF4Ih_AJZbDsb</recordid><startdate>20170301</startdate><enddate>20170301</enddate><creator>Narayana, V Lakshman</creator><creator>Bharathi, C R</creator><general>Journal of Theoretical and Applied Information</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170301</creationdate><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><author>Narayana, V Lakshman ; Bharathi, C R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-3612cdeb6ce63da653b18a63ef83bf5a016b3b1b5d95ec17800046a8bf9920f63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Narayana, V Lakshman</creatorcontrib><creatorcontrib>Bharathi, C R</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of Theoretical and Applied Information Technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Narayana, V Lakshman</au><au>Bharathi, C R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</atitle><jtitle>Journal of Theoretical and Applied Information Technology</jtitle><date>2017-03-01</date><risdate>2017</risdate><volume>95</volume><issue>5</issue><spage>1173</spage><pages>1173-</pages><issn>1817-3195</issn><abstract>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</abstract><cop>Islamabad</cop><pub>Journal of Theoretical and Applied Information</pub></addata></record>
fulltext fulltext
identifier ISSN: 1817-3195
ispartof Journal of Theoretical and Applied Information Technology, 2017-03, Vol.95 (5), p.1173
issn 1817-3195
language eng
recordid cdi_proquest_journals_1882372206
source EZB-FREE-00999 freely available EZB journals
title IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T23%3A30%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=IDENTITY%20BASED%20CRYPTOGRAPHY%20FOR%20MOBILE%20AD%20HOC%20NETWORKS&rft.jtitle=Journal%20of%20Theoretical%20and%20Applied%20Information%20Technology&rft.au=Narayana,%20V%20Lakshman&rft.date=2017-03-01&rft.volume=95&rft.issue=5&rft.spage=1173&rft.pages=1173-&rft.issn=1817-3195&rft_id=info:doi/&rft_dat=%3Cproquest%3E4321312735%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1882372206&rft_id=info:pmid/&rfr_iscdi=true