A Novel Security Approach in MANET with Certificateless Cryptography

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 4
Year of Publication : 2017
Authors : R. Rajesh

pdf
How to Cite?

R. Rajesh, "A Novel Security Approach in MANET with Certificateless Cryptography," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 4, pp. 5-12, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I4P102

Abstract:

A mobile ad hoc network is an independent collection of mobile devices that communicate with each other over wireless links and work together in a distributed manner.In this network, Security is the most important attention because of its lack of centralized devices. In mobile ad hoc networks, the load and complication for key management is intenselydependent onlimitation of the node’s accessible resources and the dynamic nature of network topology. In this proposed system, we suggest a key management method by using the ideas of certificateless public key cryptography.It is applied here not only to remove the necessity for certificates, as well as to maintain the desirable assets of identity-based key management methods without the inherent key escrow problem. Typically, keys are produced by a certificate authority that is given whole power and is tacitly trusted. In this effort, we adopt this system's advantage over MANET. The master secret keys are distributedto all the nodes that are presented within the network. This makes the system self-organized once the network has been initiated. From this key management in MANET, we achieve a maximum security to the system.

Keywords:

 public-key, Key Management, certificateless cryptography, key escrow problem, security issues

References:

[1] S.S.Al-Riyami, K.G.Paterson. Certificateless public key cryptography, page 452C473, C.S. Laih(ed.) Advances in Cryptology C Asiacrypt 2003,Lecture Notes in Computer Science, 2003.
[2] D.BonehM.Franklin. Identity-based encryption from weil pairing. pages 586–615. SIAM J. Computing 32(3), 2001.
[3] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad hoc networks”, In Proceedings of 2001 International Conference on Network Protocols, Riverside, USA, pp. 251{260, 2001.
[4] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer, A secure routing protocol for ad hoc networks, In Proceedings of 10th IEEE International Conference on Network Protocols, Paris, France, pp. 78{87, 2002.
[5] P. Papadimitratos and Z.J. Haas. Secure routing for mobile ad hoc networks, In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27{31, 2002.
[6] S. Tapaswi1, Virendra Singh Kushwah, “Securing Nodes in MANETs Using Node Based Key Management Scheme,” International Conference on Advances in Computer Engineering, IEEE, 978-0-7695-4058, Dec., 2010.
[7] Rakesh Chandra Gangwar and Anil K. Sarje,” Secure and Efficient Dynamic Group Key Agreement Proto-col for an Ad Hoc Network,” IEEE, 1-4244-0731,june 1, 2006.
[8] MengboHou and QiuliangXu,” An Efficient and Secure One- Round Authenticated Key Agreement Protocol without Pairings,” IEEE, 978-1-61284-774, Nov., 2011.
[9] Hongji Wang, Gang Yao, Qingshan Jiang, “An Identity- Based Group Key Agreement Protocol from Pairing” Third International Conference on Availability, Reliability and Security, IEEE, 0-7695-3102, Aug. 4, 2008.
[10] Zhenfei Zhang, Willy Susilo, and RaadRaad, “Mobile Adhoc Network Key Management with Certificateless Cryptography”, IEEE,978-1-4244-4242, Aug. 3, 2008.
[11] Eduardo Da Silva, Aldri L. Dos Santos, and Luiz Car-los P. Albini, “Identity-based Key Management in Mobile Ad hoc Networks: Techniques and Applications,” IEEE Wireless Communications, 1536-1284, Aug. 2008.
[12] Amit K Awasthi and Sunder Lal, “ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings,” arXiv:cs/0504097V1[cs.CR],Apr. 23, 2005.
[13] YANG Ya-tao, ZENG Ping, FANG Yong, CHI YaPing,” A Feasible Key Management Scheme in Adhoc Network , ” Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, IEEE, 0-7695-2909,July 7, 2007.
[14] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In Proc. EUROCRYPT 2004, pages 268–286.
[15] B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Key replacement attack against a generic construction of certificateless signature”, In Information Security and Privacy: 11th Australasian Conference, ACISP 2006, pages 235–246, Springer-Verlag, 2006. LNCS 4058.
[16] Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, and Younggoo Kwon, “AC-PKI: Anonymous and Certificateless Public-Key Infrastructure for Mo-bile Ad Hoc Networks,” IEEE 0-7803-8939, May 5, 2005.