Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
A Trust Conscious Secure Route Data Communication in MANETS
Rajneesh Kumar Gujral, anil kumar kapil
Pages - 9 - 15     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3   Issue - 1    |    Publication Date - February 2009  Table of Contents
MANETs, cryptography, wireless network
Security in mobile adhoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. The major difficulty in adhoc network occurs when a new node join network but not having any trusts relation with other node of network. We have proposed a new mechanism that provides trust conscious and secure data communication between the nodes. In this mechanism we will dynamically increase the trust from (Low to High) between the mobile nodes using proxy node. When mobile node needs secure data communication, it will generate a dynamic secret session key with the desired destination mobile node directly or via proxy mobile node. These dynamic secret session keys are generated using message digest and Diffie-Hellmann protocol.
CITED BY (0)  
1 Google Scholar
2 ScientificCommons
3 Academic Index
4 CiteSeerX
5 refSeek
7 Socol@r
8 ResearchGATE
9 Bielefeld Academic Search Engine (BASE)
10 Scribd
11 WorldCat
12 slideshare
14 PdfSR
15 Free-Books-Online
1 Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil jajodia , "Establishing Pairwise Keys for Secure Communication in Adhoc Networks :A Probabilistic Approach",p.p 326-331,ICNP 2003.
2 R. Housley, W. Ford, W. Polk and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile.” http:/www.faqs.org/rfcs/rfc2459.hunl, January 1999.
3 S. Yi and R. Kravets, "Key Management for Heterogeneous Adhoc Wireless Networks", IEEE ICNP'02, pp 12-15, Nov.2002.
4 C. E. Perkins and E. M. Royer,” Adhoc Networking, Adhoc On-Demand Distance Vector Routing.”,Addison-Wesley, 2000.
5 D. B. Johnson, D. A. Maltz, and 1. Broch,” DSR :The Dynamic Source Routing Protocol for Multi-Hop Wireless Adhoc Networks.”, In Adhoc Networking, ch. 5, p.p. 139-172. Addison-Wesley, 2001
6 K. Aberer and Z. Despotovic,” Managing Trust in a Peer-2-Peer Information System.”, In Proceeding of the Xth International Conference on Information and Knowledge Management, 2002.
7 K. Aberer: P-Grid, “A self organizing access structure for P2P information system.”, In Proceeding of COOPIS, 2001.
8 B. Yu and M.P. Singh,” An Evidential Model of Distributed Reputation Management.”, In Proceeding of AAMAS 02, Bologna, Italy. Publication: ACM Press July 15-19 2002.
9 A. Abdul-Rahman and S.Hailes:” A Distributed Trust Model In New Security Paradigma” Workshop 1997, ACM 1997.
10 Hadjichristofi, G.C., Adams, W.J., Davis, N.J., IV, “ A framework for key management in mobile adhoc networks”, In Proceeding of the International Conference on Information Technology: Coding and Computing , IEEE Computer Society, Volume 2, pp.568-573, April 2005.
11 He Huang, Shyhtsun, Felix Wu, “ An approach to certificate path discovery in mobile adhoc networks” , In Proceeding of the 1st ACM Workshop on Security of Adhoc and Security of adhoc and Sensor Networks, ACM, p.p.1-53,2003.
12 A.A. Pirzada,A.Datta,and C. McDonald, “ Propagating Trust in Pure Ad-hoc Networks for reliable Routing” , In Proceeding of the International Workshop on Wireless Ad-hoc Networks (IWWAN),2004.
13 A.A. Pirzada, A.Datta, and C. McDonald, “Trust Based Routing for Ad-hoc Wireless Networks”, In Proceeding of the IEEE International Conference on Networks (ICON’04), p.p. 326-330,2004.
14 Christian Gehrmann and Chris 1. Mitchell, "Manual authentication for wireless devices", Cryptobytes 2004, volume 7 No.1, 2004.
15 ENLIANG Du, JING Deng, "A Pairwise Key Pre•Distribution Scheme for Wireless Sensor Networks", In Proceeding of the 10th ACM conference on Computer and communications security p.p. 42-51, 2003.
16 Koh I and B. Neuman, “The Kerberos Network Authentication Service” (V5). RFC 1510, September 1993.
17 D. Otway, O. Rees, “Efficient and Timely Mutual Authentication, Operating Systems” Review,
Mr. Rajneesh Kumar Gujral
M M Engg. College - India
Professor anil kumar kapil
MMICT&BM, mullana - India