Node Authentication in MANET by using Digital Group Signature with Elliptic Curve Cryptography
DOI:
https://doi.org/10.26438/ijcse/v7i6.261265Keywords:
Ad-hoc networks; Security, Digital group signature, Elliptic curve cryptography, Node authentication, AODVAbstract
Security in the mobile ad hoc network is very challenging task due the open communication, absence of centralized control and authentication mechanism. In order to handle these security and reliability issues in the MANET (Mobile Ad hoc Networks), we have proposed a group digital signature and elective curve cryptography based modified AODV (Ad hoc On Demand Distance Vector Routing) routing protocol which provides authentication and reliable communication. Proposed digital group signature method has group manager which has administrative properties like to regulate the authentication mechanism and to handle the dispute or unauthorized node and it is able to check and verify the other node authenticity. We have tested our method on the basis of packet delivery ration, network throughput and the network load. Our approach will increase the transmission reliability and reduces the packet loss chance in comparison to existing approaches.
References
[1] Jeenat Sultana; Tasnuva Ahmed2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
[2] N Chaitanya Kumar; Abdul Basit; Priyadarshi Singh; V. Ch. Venkaiah2017 International Conference on Inventive Computing and Informatics (ICICI)
[3] Elbasher Elmahdi, Seong-Moo Yoo and Kumar Sharshembiev, 2018 securing data forwarding against black hole attacks in mobile Ad-hoc network.
[4] Amit Kumar Yogi; Jayesh Surana2016 International Conference on ICT in Business Industry & Government (ICTBIG)
[5] H.S. Chiu And K.S. Lui. DelPHI: Wormhole Detection Mechanism For Ad-Hoc Wireless Networks. In Proceedings International Symposium On Wireless Pervasive Computing, Phuket, Thailand, Jan. 2006.
[6] Ming-Yang Su. Warp: A Wormhole Avoidance Routing Protocol By Anamoly Detection In Mobile Ad-Hoc Networks. Computer Security, Vol.29, March 2010.
[7] F.Stanjano, R.Anderson, “The Resurrecting Duckling: Security Issues for Ubiquitous Computing,” Vol. 35, pp. 22-26, Apr, 2002.
[8] H.L.Nguyen,U.T.Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks,” International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006.
[9] H.Deng, W.Li and D.P.Agrawal, “Routing Security in Wireless Ad-Hoc Networks,” University of Cincinnati, IEEE Communication Magzine, Oct, 2002.
[10] N.Shanti, Lganesan and K.Ramar, “Study of Different Attacks On Multicast Mobile Ad-Hoc Network”.
[11] V.Mahajan, M.Natue and A.Sethi, “ Analysis of Wormhole Intrusion attacks in MANETs,” IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
[12] S. Kannan, T. Maragatham, Attack Detection and prevention methods in Proactive and Reactive Routing protocols, International Business Management 5(3), 2011
[13] Zhang, Lili, et al. "Group signature based privacy protection algorithm for mobile ad hoc network." Information and Automation (ICIA), IEEE International Conference on, 2017.
[14] Falgun Shah and Hitul Patel, “A Survey of Digital and Group Signature”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.6, June- 2016, pg. 274-278.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
