Nothing Special   »   [go: up one dir, main page]

Skip to main content

Abstract

The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like—unavailable central infrastructure services, periodic movable nodes, wireless link unsteadiness, and possible network separations. In this paper, we present a cryptographic key management scheme for secure communications in ad hoc networks. The scheme transmits the data in the presence of security attacks. The scheme provides the scalability of nodes and storage space wherein the nodes makes use of more than one key pair to encrypt and decrypt the messages. The scheme has been executed in Java programming language and empirically valued its efficiency via performance and security assessments. The simulation outcome has shown that the proposed scheme opposes against selfish nodes and takes less key storage space than traditional schemes. The scheme also satisfies the secure communication requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cheng, X., Huang, X., Du, D.Z.: Ad Hoc Wireless Networking. Kluwer Academic Publishers (2006)

    Google Scholar 

  2. Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education (2006)

    Google Scholar 

  3. Stallings, W.: Cryptography and Network Security: Principles and Practice. 4th edn. Prentice Hall (2005)

    Google Scholar 

  4. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  5. Gandhi, C., Dave, M.: A review of security in mobile ad hoc networks. IETE Tech. Rev. 23(6), 335–344 (2006)

    Article  Google Scholar 

  6. Choi, D., Younho, L.E.E., Yongsu, P.A.R.K., JIN, S.H., Yoon, H.: Efficient and secure self organized public key management for mobile ad hoc networks. IEICE Trans. Commun. E91–B(11), 3574–3583 (2008)

    Google Scholar 

  7. Dahshan, H., Irvine, J.: A Robust Self-Organized Public Key Management for Mobile Ad Hoc Networks. Security Communication Networks, Wiley InterScience, vol. 3, pp. 16–30, (2009)

    Google Scholar 

  8. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)

    Article  Google Scholar 

  9. Capkun, S., Hubaux, J., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mob. Comput. 5(1), 43–51 (2006)

    Article  Google Scholar 

  10. Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad Hoc Networks. Elsevier’s Computers and Security, pp. 199–214 (2009)

    Google Scholar 

  11. He, W., Huang, Y., Ravishankar, S., Nahrstedt, K., Lee, W.C.: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad hoc networks. IEEE Trans. Forensics Secur. 4(1), 140–150 (2009)

    Article  Google Scholar 

  12. Yi-Chun, Hu, Perrig, Adrian: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)

    Article  Google Scholar 

  13. Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: Proceedings of IEEE 6th International Conference on Information, Communications and Signal Processing, pp. 1–5 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuncha Sahadevaiah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sahadevaiah, K., Ramakrishnaiah, N., Prasad Reddy, P.V.G.D. (2016). An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30927-9_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30926-2

  • Online ISBN: 978-3-319-30927-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics