Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
Keywords:
Personal Identity Information (PII), Identity Management (IDM), Service Provider(SP), Trusted Third Party(TTP)Abstract
A Network user has to provide susceptible personal information (e.g. name, residence address, credit/debit card number, contact number, driver’s license number and date of birth, etc.) when they are rPersonal Identity Information (PII)equested by some Web page. This exclusive Personal Identity Information may be used to exclusively 2identify, contact and/or locate a particular user. This information may be exploited and abused if not properly protected. An Identity Management (IDM) system is therefore proposed to overcome this problem and helps to decide the access to this information in a secure manner. The concept of key management has been implemented to achieve the goal of trusted communication. The group public key management scheme, trust of a node.
References
Pallavi Khatri, "Using Identity and Trust with Key Management for achieving security in Ad hoc Networks" INDIA, _c 2014 IEEE
Lingfang Zeng , Shibin Chen , Qingsong Wei , and Dan Feng, " SeDas: A Self-Destructing Data System Based on Active Storage Framework", China,2013 IEEE
R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315
A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, “Defeating vanish with low-cost sybil attacks against large DHEs,” in Proc. Network and Distributed System Security Symp., 2010.
L. Zeng, Z. Shi, S. Xu, and D. Feng, “Safevanish: An improved data self-destruction for protecting data privacy,” in Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
J. R. Douceur, “The sybil attack,” in Proc. IPTPS ’01: Revised Papers From the First Int. Workshop on Peer-to-Peer Systems, 2002.
. C.E. Perklins, “Ad Hoc Networking”, 1st edition. Addison –Wesley Professional, 2001.
. I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Volume 47, 2005, pp. 445-487.
. H. Dahshan, and J. Irvine, “A trust based threshold cryptography key management for mobile ad hoc networks,” IEEE 70th Vehicular Technology Conf., Anchorage, AK, USA, pp. 1-5, Sept. 2009,.
. S. Capkun, L. Buttya, and J.-P. Hubaux, “Selforganized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. – Mar., 2003.
. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO‘84, 1984, pp. 47–53. [14]. Y. G. Desmedt, “Threshold cryptography,” European Transactions on Telecommunications, vol. 5, no. 4, pp.
. J. Huang and D. Nicol, “A calculus of trust and its application to PKI and identity management,” ACM 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, April 2009.
. N. V. Vinh, M.-K. Kim, H. Jun, and N. Q. Tung, “Group-based public-key management for self-securing large mobile ad-hoc networks,” Int’l Forum on Strategic Technology, pp. 250-253, Oct. 2007 .
. B. Poettering, 2006, SSSS: Shamir’s Secret Sharing Scheme [Online]. Available: http://point-at-infinity.org/ssss/
. Khatri, P., Tapaswi, S. & Verma, U.P. (2012). Trust evaluation in wireless ad hoc networks using fuzzy system. In V. Potdar & D. Mukhopadhyay (eds.), pp. 779-783, CUBE 2012.
. L. Qin and D. Feng, “Active storage framework for object-based storage device,” in Proc. IEEE 20th Int. Conf. Advanced Information Networking and Applications (AINA), 2006.
. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. IEEE INFOCOM, 2010.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
