Open Access   Article Go Back

Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography

Atul Dubey1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 261-265, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.261265

Online published on Jun 30, 2019

Copyright © Atul Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Atul Dubey, “Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.261-265, 2019.

MLA Style Citation: Atul Dubey "Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography." International Journal of Computer Sciences and Engineering 7.6 (2019): 261-265.

APA Style Citation: Atul Dubey, (2019). Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography. International Journal of Computer Sciences and Engineering, 7(6), 261-265.

BibTex Style Citation:
@article{Dubey_2019,
author = {Atul Dubey},
title = {Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {261-265},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4540},
doi = {https://doi.org/10.26438/ijcse/v7i6.261265}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.261265}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4540
TI - Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Atul Dubey
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 261-265
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
315 373 downloads 167 downloads
  
  
           

Abstract

Security in the mobile ad hoc network is very challenging task due the open communication, absence of centralized control and authentication mechanism. In order to handle these security and reliability issues in the MANET (Mobile Ad hoc Networks), we have proposed a group digital signature and elective curve cryptography based modified AODV (Ad hoc On Demand Distance Vector Routing) routing protocol which provides authentication and reliable communication. Proposed digital group signature method has group manager which has administrative properties like to regulate the authentication mechanism and to handle the dispute or unauthorized node and it is able to check and verify the other node authenticity. We have tested our method on the basis of packet delivery ration, network throughput and the network load. Our approach will increase the transmission reliability and reduces the packet loss chance in comparison to existing approaches

Key-Words / Index Term

Ad-hoc networks; Security; Digital group signature; Elliptic curve cryptography; Node authentication; AODV

References

[1] Jeenat Sultana; Tasnuva Ahmed2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
[2] N Chaitanya Kumar; Abdul Basit; Priyadarshi Singh; V. Ch. Venkaiah2017 International Conference on Inventive Computing and Informatics (ICICI)
[3] Elbasher Elmahdi, Seong-Moo Yoo and Kumar Sharshembiev, 2018 securing data forwarding against black hole attacks in mobile Ad-hoc network.
[4] Amit Kumar Yogi; Jayesh Surana2016 International Conference on ICT in Business Industry & Government (ICTBIG)
[5] H.S. Chiu And K.S. Lui. DelPHI: Wormhole Detection Mechanism For Ad-Hoc Wireless Networks. In Proceedings International Symposium On Wireless Pervasive Computing, Phuket, Thailand, Jan. 2006.
[6] Ming-Yang Su. Warp: A Wormhole Avoidance Routing Protocol By Anamoly Detection In Mobile Ad-Hoc Networks. Computer Security, Vol.29, March 2010.
[7] F.Stanjano, R.Anderson, “The Resurrecting Duckling: Security Issues for Ubiquitous Computing,” Vol. 35, pp. 22-26, Apr, 2002.
[8] H.L.Nguyen,U.T.Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks,” International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006.
[9] H.Deng, W.Li and D.P.Agrawal, “Routing Security in Wireless Ad-Hoc Networks,” University of Cincinnati, IEEE Communication Magzine, Oct, 2002.
[10] N.Shanti, Lganesan and K.Ramar, “Study of Different Attacks On Multicast Mobile Ad-Hoc Network”.
[11] V.Mahajan, M.Natue and A.Sethi, “ Analysis of Wormhole Intrusion attacks in MANETs,” IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
[12] S. Kannan, T. Maragatham, Attack Detection and prevention methods in Proactive and Reactive Routing protocols, International Business Management 5(3), 2011
[13] Zhang, Lili, et al. "Group signature based privacy protection algorithm for mobile ad hoc network." Information and Automation (ICIA), IEEE International Conference on, 2017.
[14] Falgun Shah and Hitul Patel, “A Survey of Digital and Group Signature”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.6, June- 2016, pg. 274-278.