IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS
MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography s...
Gespeichert in:
Veröffentlicht in: | Journal of Theoretical and Applied Information Technology 2017-03, Vol.95 (5), p.1173 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 5 |
container_start_page | 1173 |
container_title | Journal of Theoretical and Applied Information Technology |
container_volume | 95 |
creator | Narayana, V Lakshman Bharathi, C R |
description | MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1882372206</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4321312735</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-3612cdeb6ce63da653b18a63ef83bf5a016b3b1b5d95ec17800046a8bf9920f63</originalsourceid><addsrcrecordid>eNotjUFrwjAYQHPYQOf2HwI7F5J85mtyrG20ZZ2RGpCeJGmTg4zprP7_CdvpwTu890TmXPE8A67ljLxM04kxFEst5wSbymxd43q6KvamomXX75zddMWu7unadvTTrprW0KKitS3p1riD7T72r-Q5-a8pvv1zQdzauLLOWrtpyqLNLlrdMkAuhjEGHCLC6FFC4MojxKQgJOkZx_BQQY5axoHnijG2RK9C0lqwhLAg73_Zy_X8c4_T7Xg636_fj-ORKyUgF4Ih_AJZbDsb</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1882372206</pqid></control><display><type>article</type><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Narayana, V Lakshman ; Bharathi, C R</creator><creatorcontrib>Narayana, V Lakshman ; Bharathi, C R</creatorcontrib><description>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</description><identifier>ISSN: 1817-3195</identifier><language>eng</language><publisher>Islamabad: Journal of Theoretical and Applied Information</publisher><ispartof>Journal of Theoretical and Applied Information Technology, 2017-03, Vol.95 (5), p.1173</ispartof><rights>Copyright Journal of Theoretical and Applied Information Mar 2017</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Narayana, V Lakshman</creatorcontrib><creatorcontrib>Bharathi, C R</creatorcontrib><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><title>Journal of Theoretical and Applied Information Technology</title><description>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</description><issn>1817-3195</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotjUFrwjAYQHPYQOf2HwI7F5J85mtyrG20ZZ2RGpCeJGmTg4zprP7_CdvpwTu890TmXPE8A67ljLxM04kxFEst5wSbymxd43q6KvamomXX75zddMWu7unadvTTrprW0KKitS3p1riD7T72r-Q5-a8pvv1zQdzauLLOWrtpyqLNLlrdMkAuhjEGHCLC6FFC4MojxKQgJOkZx_BQQY5axoHnijG2RK9C0lqwhLAg73_Zy_X8c4_T7Xg636_fj-ORKyUgF4Ih_AJZbDsb</recordid><startdate>20170301</startdate><enddate>20170301</enddate><creator>Narayana, V Lakshman</creator><creator>Bharathi, C R</creator><general>Journal of Theoretical and Applied Information</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170301</creationdate><title>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</title><author>Narayana, V Lakshman ; Bharathi, C R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-3612cdeb6ce63da653b18a63ef83bf5a016b3b1b5d95ec17800046a8bf9920f63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Narayana, V Lakshman</creatorcontrib><creatorcontrib>Bharathi, C R</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of Theoretical and Applied Information Technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Narayana, V Lakshman</au><au>Bharathi, C R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS</atitle><jtitle>Journal of Theoretical and Applied Information Technology</jtitle><date>2017-03-01</date><risdate>2017</risdate><volume>95</volume><issue>5</issue><spage>1173</spage><pages>1173-</pages><issn>1817-3195</issn><abstract>MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing security in all aspects. Their natural characteristics make them vulnerable to passive and active attacks, in which misbehaving nodes can eavesdrop or delete packets, modify packet contents. The Identity-based cryptography system to MANET mainly concentrates on deal out the responsibility of consistent ability among the multiple nodes in a network. Cryptographic technique which uses public key is the mechanism considered in this regard. Secret sharing mechanism is adopted by many existing systems which involves secret sharing of keys to a trusted node among nodes in a network which increases security level. Here we propose threshold cryptography which makes the authority more robust against network disasters and harder to negotiation. Identity-based cryptography, where any identity may assist as a public key, makes certificates and certificate distribution superfluous. The authority distributing private keys corresponding to identities is called a Private Key Generator (PKG). The proposed method deliberates distributing a PKG towards the nodes in the MANET. It shows the security properties of the base IBC systems are preserved when this distributed PKG is used instead of the original.</abstract><cop>Islamabad</cop><pub>Journal of Theoretical and Applied Information</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1817-3195 |
ispartof | Journal of Theoretical and Applied Information Technology, 2017-03, Vol.95 (5), p.1173 |
issn | 1817-3195 |
language | eng |
recordid | cdi_proquest_journals_1882372206 |
source | EZB-FREE-00999 freely available EZB journals |
title | IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T23%3A30%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=IDENTITY%20BASED%20CRYPTOGRAPHY%20FOR%20MOBILE%20AD%20HOC%20NETWORKS&rft.jtitle=Journal%20of%20Theoretical%20and%20Applied%20Information%20Technology&rft.au=Narayana,%20V%20Lakshman&rft.date=2017-03-01&rft.volume=95&rft.issue=5&rft.spage=1173&rft.pages=1173-&rft.issn=1817-3195&rft_id=info:doi/&rft_dat=%3Cproquest%3E4321312735%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1882372206&rft_id=info:pmid/&rfr_iscdi=true |