Reputation based Symmetric Key Authentication for Secure Data Transmission in Mobile Ad Hoc Networks

被引:0
|
作者
Sangeetha, S. [1 ]
Sathappan, S. [1 ]
机构
[1] Erode Arts & Sci Coll, Dept Comp Sci, Erode 638112, Tamil Nadu, India
关键词
Reputation; Mobile nodes; Node authentication; Confidentiality; Symmetric key Cryptography; Secret key; SCHEME;
D O I
10.4108/eetsis.v10i3.1940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
INTRODUCTION: MANETs were a group of nodes which connected each other to establish the network via wireless association to forward packets towards destinations. OBJECTIVES: Reputation-based Symmetric Key Authentication (RSKA) technique is proposed to improve the security of data communication, which securely transmits data packets within MANET communication. Initially, a reputation counts-based node authentication algorithm is designed in RSKA technique by considering the reputation value of mobile nodes in networks. METHODS: By using a reputation count-based node authentication algorithm, the RSKA technique performs the node authentication process before initiating route identification and selects cooperative nodes in MANETs for data transmission. Therefore, the RSKA of nodes results in improved security of data communication for enhancing throughput and reducing data loss rate. Besides, the RSKA technique uses symmetric key cryptography for secure data transmission in which a secret key is generated for the data to be transmitted by the corresponding mobile node along the route path of the source-destination pair. The destination node having the secret key can only decrypt the cypher text. RESULTS: Thus, the RSKA technique improves the data confidentiality rate as well as minimizes the time to protect the data transmission in an efficient way. RSKA was calculated by various parameters, namely data loss rate, throughput and time to protect data delivery as well as data confidentiality rate. CONCLUSION: The simulation result of RSKA improves the data confidentiality rate for achieving secured data transmission as well as minimizes time to protect data delivery within MANETs compared with conventional methods.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [41] An Efficient and Secure Group Key Agreement Scheme for Mobile Ad Hoc Networks
    Chen Li-qing
    Ding Jin
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 522 - 525
  • [42] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [43] A secure architecture for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 424 - +
  • [44] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [45] Enhanced reputation mechanism for mobile ad hoc networks
    Liu, JS
    Issarny, V
    [J]. TRUST MANAGEMENT, PROCEEDING, 2004, 2995 : 48 - 62
  • [46] Reputation propagation and agreement in mobile ad hoc networks
    Liu, YB
    Yang, R
    [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1510 - 1515
  • [47] Secure Lightweight Data Transmission Scheme for Vehicular Ad hoc Networks
    Vasudev, Harsha
    Das, Debasis
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [48] Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks
    Memarmoshrefi, Parisa
    Seibel, Roman
    Hogrefe, Dieter
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 149 - 160
  • [49] Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks
    Parisa Memarmoshrefi
    Roman Seibel
    Dieter Hogrefe
    [J]. Mobile Networks and Applications, 2016, 21 : 149 - 160
  • [50] Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
    Ramkumar, M
    Memon, N
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1405 - 1409