Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
Pranav Nair1 , Archana Jadhav2 , Swapnaja Gunjal3 , Ruchita Gadsing4
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-12 , Page no. 21-24, Dec-2014
Online published on Dec 31, 2014
Copyright © Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing, “Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.21-24, 2014.
MLA Style Citation: Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing "Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management." International Journal of Computer Sciences and Engineering 2.12 (2014): 21-24.
APA Style Citation: Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing, (2014). Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management. International Journal of Computer Sciences and Engineering, 2(12), 21-24.
BibTex Style Citation:
@article{Nair_2014,
author = {Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing},
title = {Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {21-24},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=324},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=324
TI - Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
T2 - International Journal of Computer Sciences and Engineering
AU - Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 21-24
IS - 12
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3856 | 3664 downloads | 3786 downloads |
Abstract
A Network user has to provide susceptible personal information (e.g. name, residence address, credit/debit card number, contact number, driver’s license number and date of birth, etc.) when they are requested by some Web page. This exclusive Personal Identity Information may be used to exclusively identify, contact and/or locate a particular user. This information may be exploited and abused if not properly protected. An Identity Management (IDM) system is therefore proposed to overcome this problem and helps to decide the access to this information in a secure manner. The concept of key management has been implemented to achieve the goal of trusted communication. The group public key management scheme, trust of a node and physical identity helps in secure data transfer over wireless channels through the concept of composite identity and trust based model(CIDT). To validate a node in the network Trust Factor of a node along with its key pair and identity is used. Proposed method works well for self certification scheme of a node in the network.
Key-Words / Index Term
Personal Identity Information(PII), Identity Management(IDM), Service Provider(SP), Trusted Third Party(TTP)
References
[1] Pallavi Khatri, "Using Identity and Trust with Key Management for achieving security in Ad hoc Networks" INDIA, _c 2014 IEEE
[2] Shibin Chen , Lingfang Zeng , Qingsong Wei and Dan Feng, SeDas:- A Self-Destructing Data System Based on Active Storage Framework", China,2013 IEEE
[3] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315
[4] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[5] S. Wolchok, O. S. Hofmann W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, “Defeating vanish with low-cost sybill attacks against large DHEs,” in Proc. Network and Distributed System Security Symp., 2010.
[6] L. Zeng, Z. Shi, S. Xu, and D. Feng, “Safevanish: An improved data self-destruction for protecting data privacy,” in Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
[7] J. R. Douceur, “The sybil attack,” in Proc. IPTPS ’01: Revised Papers From the First Int. Workshop on Peer-to-Peer Systems, 2002.
[8]. C.E. Perklins, “Ad Hoc Networking”, 1st edition. Addison –Wesley Professional, 2001.
[9]. I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Volume 47, 2005, pp. 445-487.
[10]. H. Dahshan, and J. Irvine, “A trust based threshold cryptography key management for mobile ad hoc networks,” IEEE 70th Vehicular Technology Conf., Anchorage, AK, USA, pp. 1-5, Sept. 2009,.
[11]. S. Capkun, L. Buttya, and J.-P. Hubaux, “Selforganized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. – Mar., 2003.
[12]. B.J. Chang and S.L. Kuo, “Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs,” IEEE Transactions on Vehicular Technology, vol. 58, no. 5, pp. 1846-1863, May 2009.
[13]. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO‘84, 1984, pp. 47–53.
[14]. Y. G. Desmedt, “Threshold cryptography,” European Transactions on Telecommunications, vol. 5, no. 4, pp. 449-458, July/Aug. 1994.
[15]. J. Huang and D. Nicol, “application to PKI and IDM with calculus of trust,” ACM 8th Symposium on Identity and Trust on the Internet,
Gaithersburg, MD, USA, April 2009.
[16]. B. Poettering, 2006, SSSS: Shamir’s Secret Sharing Scheme [Online].
Available: http://point-at-infinity.org/ssss/
[17]. Khatri, P., Tapaswi, S. & Verma, U.P. (2012). Trust
evaluation in wireless ad hoc networks using fuzzy
system. In V. Potdar & D. Mukhopadhyay (eds.), pp.
779-783, CUBE 2012.