Reputation based Symmetric Key Authentication for Secure Data Transmission in Mobile Ad Hoc Networks

被引:0
|
作者
Sangeetha, S. [1 ]
Sathappan, S. [1 ]
机构
[1] Erode Arts & Sci Coll, Dept Comp Sci, Erode 638112, Tamil Nadu, India
关键词
Reputation; Mobile nodes; Node authentication; Confidentiality; Symmetric key Cryptography; Secret key; SCHEME;
D O I
10.4108/eetsis.v10i3.1940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
INTRODUCTION: MANETs were a group of nodes which connected each other to establish the network via wireless association to forward packets towards destinations. OBJECTIVES: Reputation-based Symmetric Key Authentication (RSKA) technique is proposed to improve the security of data communication, which securely transmits data packets within MANET communication. Initially, a reputation counts-based node authentication algorithm is designed in RSKA technique by considering the reputation value of mobile nodes in networks. METHODS: By using a reputation count-based node authentication algorithm, the RSKA technique performs the node authentication process before initiating route identification and selects cooperative nodes in MANETs for data transmission. Therefore, the RSKA of nodes results in improved security of data communication for enhancing throughput and reducing data loss rate. Besides, the RSKA technique uses symmetric key cryptography for secure data transmission in which a secret key is generated for the data to be transmitted by the corresponding mobile node along the route path of the source-destination pair. The destination node having the secret key can only decrypt the cypher text. RESULTS: Thus, the RSKA technique improves the data confidentiality rate as well as minimizes the time to protect the data transmission in an efficient way. RSKA was calculated by various parameters, namely data loss rate, throughput and time to protect data delivery as well as data confidentiality rate. CONCLUSION: The simulation result of RSKA improves the data confidentiality rate for achieving secured data transmission as well as minimizes time to protect data delivery within MANETs compared with conventional methods.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [1] Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
    Vijayakumar, Pandi
    Azees, Maria
    Kannan, Arputharaj
    Deborah, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) : 1015 - 1028
  • [2] A secure data transmission scheme for mobile ad hoc networks
    Zheng, Qunwei
    Hong, Xiaoyan
    Liu, Jun
    Tang, Lei
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1006 - 1010
  • [3] A secure data transmission protocol for mobile ad hoc networks
    Lu, Shejie
    Li, Jun
    Liu, Zhiyuan
    Cui, Guohua
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 184 - +
  • [4] An Identification based Authentication Protocol for Secure Data Transmission in Ad-Hoc Networks
    Cho, Youngbok
    Ning, Sun
    Lee, Sangho
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2012, 5 (02): : 107 - 120
  • [5] Comments on "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks"
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (07) : 2149 - 2151
  • [6] Secure data transmission on multiple paths in mobile ad hoc networks
    Xia, GeMing
    Huang, ZunGuo
    Wang, ZhiYing
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 424 - 434
  • [7] Reply to Comments on "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks"
    Azees, Maria
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (09) : 3595 - 3595
  • [8] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    [J]. IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [9] Secure opinion sharing for reputation-based systems in mobile ad hoc networks
    Sangi, Abdur Rashid
    Liu, Jianwei
    Alkatheiri, Mohammed S.
    Anamalamudi, Satish
    [J]. MEASUREMENT & CONTROL, 2020, 53 (3-4): : 748 - 756
  • [10] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954