Dec 26, 2014 · This study presents the analyzing and evaluation several routing algorithms and a novel scheme to build an authentication system by adding the ...
In this research we analyzed several famous routing protocols in ad-hoc network and we also introduced the modified zero knowledge proof algorithm to build an ...
This study presents the analyzing and evaluation several routing algorithms and a novel scheme to build an authentication system by adding the modified zero ...
Oct 22, 2024 · A wireless ad-hoc network is an autonomous system of wireless routers, fixed or mobile those communicate with each other via radio links without ...
We propose a complete protocol to detect a chain of cooperating malicious nodes in an ad hoc network that disrupts transmission of data by feeding wrong routing ...
[PDF] Implementation of Zero Knowledge Protocol in Wireless Security - IRJET
www.irjet.net › archives
We implement zero knowledge protocol (ZKP) for the verification of sender sensor nodes. With attachment of unique fingerprint to each node we address the clone ...
In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and ...
Soewito B, Marcellinus Y and Hapsara M. (2014). Secure Wireless Ad Hoc Network using Zero Knowledge Proof. Journal of Computer Science, 10 (12), 2488-2493.
People also ask
What is secure authentication using zero knowledge proof?
What is security in adhoc wireless network?
What are the disadvantages of wireless ad hoc network?
The Zero Knowledge Proof protocol allows the creation and management of a spontaneous wireless ad hoc network. Secure protocol (ZKP) is used to share the ...
This study investigates the applicability of an elegant, yet relatively under- applied paradigm for member authentication, namely, Zero Knowledge Proofs. (ZKPs) ...