Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Trust Conscious Secure Route Data Communication in MANETS
Rajneesh Kumar Gujral, anil kumar kapil
Pages - 9 - 15     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3   Issue - 1    |    Publication Date - February 2009  Table of Contents
MORE INFORMATION
KEYWORDS
MANETs, cryptography, wireless network
ABSTRACT
Security in mobile adhoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. The major difficulty in adhoc network occurs when a new node join network but not having any trusts relation with other node of network. We have proposed a new mechanism that provides trust conscious and secure data communication between the nodes. In this mechanism we will dynamically increase the trust from (Low to High) between the mobile nodes using proxy node. When mobile node needs secure data communication, it will generate a dynamic secret session key with the desired destination mobile node directly or via proxy mobile node. These dynamic secret session keys are generated using message digest and Diffie-Hellmann protocol.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
15 Free-Books-Online 
A. Abdul-Rahman and S.Hailes:” A Distributed Trust Model In New Security Paradigma” Workshop 1997, ACM 1997.
A.A. Pirzada, A.Datta, and C. McDonald, “Trust Based Routing for Ad-hoc Wireless Networks”, In Proceeding of the IEEE International Conference on Networks (ICON’04), p.p. 326-330,2004.
A.A. Pirzada,A.Datta,and C. McDonald, “ Propagating Trust in Pure Ad-hoc Networks for reliable Routing” , In Proceeding of the International Workshop on Wireless Ad-hoc Networks (IWWAN),2004.
B. Yu and M.P. Singh,” An Evidential Model of Distributed Reputation Management.”, In Proceeding of AAMAS 02, Bologna, Italy. Publication: ACM Press July 15-19 2002.
C. E. Perkins and E. M. Royer,” Adhoc Networking, Adhoc On-Demand Distance Vector Routing.”,Addison-Wesley, 2000.
Christian Gehrmann and Chris 1. Mitchell, "Manual authentication for wireless devices", Cryptobytes 2004, volume 7 No.1, 2004.
D. B. Johnson, D. A. Maltz, and 1. Broch,” DSR :The Dynamic Source Routing Protocol for Multi-Hop Wireless Adhoc Networks.”, In Adhoc Networking, ch. 5, p.p. 139-172. Addison-Wesley, 2001
D. Otway, O. Rees, “Efficient and Timely Mutual Authentication, Operating Systems” Review,
ENLIANG Du, JING Deng, "A Pairwise Key Pre•Distribution Scheme for Wireless Sensor Networks", In Proceeding of the 10th ACM conference on Computer and communications security p.p. 42-51, 2003.
Hadjichristofi, G.C., Adams, W.J., Davis, N.J., IV, “ A framework for key management in mobile adhoc networks”, In Proceeding of the International Conference on Information Technology: Coding and Computing , IEEE Computer Society, Volume 2, pp.568-573, April 2005.
He Huang, Shyhtsun, Felix Wu, “ An approach to certificate path discovery in mobile adhoc networks” , In Proceeding of the 1st ACM Workshop on Security of Adhoc and Security of adhoc and Sensor Networks, ACM, p.p.1-53,2003.
K. Aberer and Z. Despotovic,” Managing Trust in a Peer-2-Peer Information System.”, In Proceeding of the Xth International Conference on Information and Knowledge Management, 2002.
K. Aberer: P-Grid, “A self organizing access structure for P2P information system.”, In Proceeding of COOPIS, 2001.
Koh I and B. Neuman, “The Kerberos Network Authentication Service” (V5). RFC 1510, September 1993.
R. Housley, W. Ford, W. Polk and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile.” http:/www.faqs.org/rfcs/rfc2459.hunl, January 1999.
S. Yi and R. Kravets, "Key Management for Heterogeneous Adhoc Wireless Networks", IEEE ICNP'02, pp 12-15, Nov.2002.
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil jajodia , "Establishing Pairwise Keys for Secure Communication in Adhoc Networks :A Probabilistic Approach",p.p 326-331,ICNP 2003.
Mr. Rajneesh Kumar Gujral
M M Engg. College - India
Professor anil kumar kapil
MMICT&BM, mullana - India
anil_kdk@yahoo.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS