Open Access   Article Go Back

Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management

Pranav Nair1 , Swapnaja Gunjal2 , Archana Jadhav3 , Ruchita Gadsing4

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-4 , Page no. 68-74, Apr-2015

Online published on May 04, 2015

Copyright © Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing, “Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.68-74, 2015.

MLA Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing "Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management." International Journal of Computer Sciences and Engineering 3.4 (2015): 68-74.

APA Style Citation: Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing, (2015). Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management. International Journal of Computer Sciences and Engineering, 3(4), 68-74.

BibTex Style Citation:
@article{Nair_2015,
author = {Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing},
title = {Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2015},
volume = {3},
Issue = {4},
month = {4},
year = {2015},
issn = {2347-2693},
pages = {68-74},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=464},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=464
TI - Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
T2 - International Journal of Computer Sciences and Engineering
AU - Pranav Nair, Swapnaja Gunjal, Archana Jadhav , Ruchita Gadsing
PY - 2015
DA - 2015/05/04
PB - IJCSE, Indore, INDIA
SP - 68-74
IS - 4
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2590 2435 downloads 2492 downloads
  
  
           

Abstract

A Network user has to provide susceptible personal information (e.g. name, residence address, credit/debit card number, contact number, driver’s license number and date of birth, etc.) when they are requested by some Web page. This exclusive Personal Identity Information may be used to exclusively 2identify, contact and/or locate a particular user. This information may be exploited and abused if not properly protected. An Identity Management (IDM) system is therefore proposed to overcome this problem and helps to decide the access to this information in a secure manner. The concept of key management has been implemented to achieve the goal of trusted communication. The group public key management scheme, trust of a node.

Key-Words / Index Term

Personal Identity Information (PII), Identity Management (IDM), Service Provider(SP), Trusted Third Party(TTP)

References

[1] Pallavi Khatri, "Using Identity and Trust with Key Management for achieving security in Ad hoc Networks" INDIA, _c 2014 IEEE
[2] Lingfang Zeng , Shibin Chen , Qingsong Wei , and Dan Feng, " SeDas: A Self-Destructing Data System Based on Active Storage Framework", China,2013 IEEE
[3] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315
[4] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[5] S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, “Defeating vanish with low-cost sybil attacks against large DHEs,” in Proc. Network and Distributed System Security Symp., 2010.
[6] L. Zeng, Z. Shi, S. Xu, and D. Feng, “Safevanish: An improved data self-destruction for protecting data privacy,” in Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
[7] J. R. Douceur, “The sybil attack,” in Proc. IPTPS ’01: Revised Papers From the First Int. Workshop on Peer-to-Peer Systems, 2002.
[8]. C.E. Perklins, “Ad Hoc Networking”, 1st edition. Addison –Wesley Professional, 2001.
[9]. I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Volume 47, 2005, pp. 445-487.
[10]. H. Dahshan, and J. Irvine, “A trust based threshold cryptography key management for mobile ad hoc networks,” IEEE 70th Vehicular Technology Conf., Anchorage, AK, USA, pp. 1-5, Sept. 2009,.
[11]. S. Capkun, L. Buttya, and J.-P. Hubaux, “Selforganized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. – Mar., 2003.
[12]. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO‘84, 1984, pp. 47–53. [14]. Y. G. Desmedt, “Threshold cryptography,” European Transactions on Telecommunications, vol. 5, no. 4, pp.
[15]. J. Huang and D. Nicol, “A calculus of trust and its application to PKI and identity management,” ACM 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, April 2009.
[16]. N. V. Vinh, M.-K. Kim, H. Jun, and N. Q. Tung, “Group-based public-key management for self-securing large mobile ad-hoc networks,” Int’l Forum on Strategic Technology, pp. 250-253, Oct. 2007 .
[17]. B. Poettering, 2006, SSSS: Shamir’s Secret Sharing Scheme [Online]. Available: http://point-at-infinity.org/ssss/
[18]. Khatri, P., Tapaswi, S. & Verma, U.P. (2012). Trust evaluation in wireless ad hoc networks using fuzzy system. In V. Potdar & D. Mukhopadhyay (eds.), pp. 779-783, CUBE 2012.
[19]. L. Qin and D. Feng, “Active storage framework for object-based storage device,” in Proc. IEEE 20th Int. Conf. Advanced Information Networking and Applications (AINA), 2006.
[20]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. IEEE INFOCOM, 2010.