Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
Pranav Nair1 , Swapnaja Gunjal2 , Archana Jadhav3 , Ruchita Gadsing4
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-4 , Page no. 68-74, Apr-2015
Online published on May 04, 2015
Copyright © Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing, “Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.68-74, 2015.
MLA Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing "Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management." International Journal of Computer Sciences and Engineering 3.4 (2015): 68-74.
APA Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing, (2015). Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management. International Journal of Computer Sciences and Engineering, 3(4), 68-74.
BibTex Style Citation:
@article{Nair_2015,
author = {Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing},
title = {Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2015},
volume = {3},
Issue = {4},
month = {4},
year = {2015},
issn = {2347-2693},
pages = {68-74},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=464},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=464
TI - Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
T2 - International Journal of Computer Sciences and Engineering
AU - Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing
PY - 2015
DA - 2015/05/04
PB - IJCSE, Indore, INDIA
SP - 68-74
IS - 4
VL - 3
SN - 2347-2693
ER -
VIEWS | XML | |
2590 | 2435 downloads | 2492 downloads |
Abstract
A Network user has to provide susceptible personal information (e.g. name, residence address, credit/debit card number, contact number, driver’s license number and date of birth, etc.) when they are requested by some Web page. This exclusive Personal Identity Information may be used to exclusively 2identify, contact and/or locate a particular user. This information may be exploited and abused if not properly protected. An Identity Management (IDM) system is therefore proposed to overcome this problem and helps to decide the access to this information in a secure manner. The concept of key management has been implemented to achieve the goal of trusted communication. The group public key management scheme, trust of a node.
Key-Words / Index Term
Personal Identity Information (PII), Identity Management (IDM), Service Provider(SP), Trusted Third Party(TTP)
References
[1] Pallavi Khatri, "Using Identity and Trust with Key Management for achieving security in Ad hoc Networks" INDIA, _c 2014 IEEE
[2] Lingfang Zeng , Shibin Chen , Qingsong Wei , and Dan Feng, " SeDas: A Self-Destructing Data System Based on Active Storage Framework", China,2013 IEEE
[3] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315
[4] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[5] S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, “Defeating vanish with low-cost sybil attacks against large DHEs,” in Proc. Network and Distributed System Security Symp., 2010.
[6] L. Zeng, Z. Shi, S. Xu, and D. Feng, “Safevanish: An improved data self-destruction for protecting data privacy,” in Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
[7] J. R. Douceur, “The sybil attack,” in Proc. IPTPS ’01: Revised Papers From the First Int. Workshop on Peer-to-Peer Systems, 2002.
[8]. C.E. Perklins, “Ad Hoc Networking”, 1st edition. Addison –Wesley Professional, 2001.
[9]. I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Volume 47, 2005, pp. 445-487.
[10]. H. Dahshan, and J. Irvine, “A trust based threshold cryptography key management for mobile ad hoc networks,” IEEE 70th Vehicular Technology Conf., Anchorage, AK, USA, pp. 1-5, Sept. 2009,.
[11]. S. Capkun, L. Buttya, and J.-P. Hubaux, “Selforganized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. – Mar., 2003.
[12]. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO‘84, 1984, pp. 47–53. [14]. Y. G. Desmedt, “Threshold cryptography,” European Transactions on Telecommunications, vol. 5, no. 4, pp.
[15]. J. Huang and D. Nicol, “A calculus of trust and its application to PKI and identity management,” ACM 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, April 2009.
[16]. N. V. Vinh, M.-K. Kim, H. Jun, and N. Q. Tung, “Group-based public-key management for self-securing large mobile ad-hoc networks,” Int’l Forum on Strategic Technology, pp. 250-253, Oct. 2007 .
[17]. B. Poettering, 2006, SSSS: Shamir’s Secret Sharing Scheme [Online]. Available: http://point-at-infinity.org/ssss/
[18]. Khatri, P., Tapaswi, S. & Verma, U.P. (2012). Trust evaluation in wireless ad hoc networks using fuzzy system. In V. Potdar & D. Mukhopadhyay (eds.), pp. 779-783, CUBE 2012.
[19]. L. Qin and D. Feng, “Active storage framework for object-based storage device,” in Proc. IEEE 20th Int. Conf. Advanced Information Networking and Applications (AINA), 2006.
[20]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. IEEE INFOCOM, 2010.