Academia.eduAcademia.edu

Outline

Key Management in Hierarchical MANET Using Kerberos

Abstract

Wireless Ad-Hoc Sensor Networks A Mobile Ad-hoc Network (MANET) is a self-ruling gathering of versatile clients that convey over generally transfer speed obliged remote connections. Following the hubs are versatile, the system topology might change quickly and erratically after some time. The system is decentralized, where all system movement including finding the topology and conveying messages must be executed by the hubs themselves, i.e. steering usefulness will be fused into portable hubs. A remote specially appointed sensor system comprises of various sensors spread over a geological zone. Every sensor has remote correspondence capacity and some level of knowledge for sign preparing and systems administration of the information. The capacity of the sensor system to total the information gathered can incredibly decrease the quantity of messages that should be transmitted over the system. Security in specially appointed systems is an imperative issue for impromptu systems, partic...

References (10)

  1. Kashif Bashir and Mohammad Khalid Khan-Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks": IACSIT International Journal of Engineering and Technology, Vol. 4, No. 3, June 2012
  2. Prof. Anil Kapil& Mr. SanjeevRana, "Identity-Based Key Management in MANETs using Public Key Cryptography" International Journal of Security (IJS), Volume (3) : Issue
  3. Vijendrasinh P. Thakur , Prof. K. N. Hande "Hash Based Dynamic Password Authentication Mechanism For Kerberos Environment" International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTV2IS70115 Vol. 2 Issue 7, July - 2013
  4. Secure Authentication in Mobile Ad-hoc Network Based on Kerberos" TANG Feng ZHONG Luo (College of Computer Science and Technology,Wuhan University of Technology,Wuhan 430070
  5. Hierarchical Approach for Key Management in Mobile Ad hoc Networks", Renuka A., Dr. K.C.Shet, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 5, No. 1, 2009
  6. Mohammad Arif, Khalid Imam Rahmani "Adaptive ARA (AARA) for MANETs". Published in IEEE Xplore in the Proceedings of 3rd Nirma University International Conference on Engineering [NUiCONE 2012], Ahmedabad, Gujarat, India, November 5, 2012. ISBN 978-1-4673-1720-7
  7. Mohammad Arif, Tara Rani. "Enhanced Ant Colony based Routing in MANETs". Published in the Proceedings of 5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011]. Pages: 48-54, Panipat, November 5, 2011. ISBN 81-87885-03-3.
  8. Mohammad Arif, Rama Shankar Yadav. "Improved Algorithmic Routing for Disruption Tolerant Network". Published in the Proceedings of the International Conference on Computer Networks and Security (ICCNS -2008), pages: 107-112, Pune, September 27 -28, 2008. ISBN 978-81-906198-1-3
  9. Mohammad Arif, Abu Daud, "Adaptive Routing Techniques in Disruption Tolerant Networks". Published in the Proceedings of the Second International Conference on Wireless & Mobile Networks (WiMoN -2010), by SPRINGER pages: 336-348, Chennai, July 23 -25, 2010. ISSN: 978-3-642-14493-6_35.
  10. Mohammad Arif, Kavita Satija, Sachin Chaudhary, "ERBR: Enhanced and Improved Delay for Requirement Based Routing in Delay Tolerant Networks". Published in the Proceedings of the Second International Conference on Networks & Communications (NetCoM -2010), by SPRINGER, pages: 464-471, Chennai, December 27 -29, 2010. ISSN: 978-3-642-17878-8_23 Treasurer