PROVISIONING OF EFFICIENT AUTHENTICATION TECHNIQUE FOR IMPLEMENTING IN LARGE SCALE NETWORKS (PEAT)
DOI:
https://doi.org/10.20894/IJMSR.117.006.001.006Keywords:
Secret key Management, Elliptical Curve Cryptography technique, Wireless Sensor Network.Abstract
Increasing attractiveness of Ad-hoc Networks, its quality and treatment has guide in the introduction of threats and attacks to bring negative consequences in the society. The typical features of ad hoc network, particularly with dynamic topology and open wireless medium, may lead network afflicted with some refuge vulnerabilities. The main challenge in designing an ad hoc network is to build them protective from different attacks in the network. The authentication must be done without much delay and should independent of the other packets. In this system we propose, Provisioning of Efficient Authentication Technique for Implementing in Large Scale Networks (PEAT). Here the Clusters are formed based on the distance and the Cluster Heads (CHs) are elected by coverage and connectivity. The secret key generation used to form the clusters securely. The CH first checks the cluster members’ secret key then formed the clusters. The Elliptical Curve Cryptography technique verifies the CH is authenticated or not. Hence, source sends the data to authenticated CH in the network. Simulation results shows that the PEAT perform better amount of data received also reduce the delay in the network.
Downloads
References
[2] Azarderskhsh, R., and Masoleh, A., “Secure clustering and symmetric Key establishment in heterogeneous wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, 2011.
[3] Yu, F.R, Tang, H., Mason, P., and Wang, F.,” A hierarchical identity based key management scheme in tactical mobile ad hoc networks,” IEEE Trans. Netw. Service Management,vol. 7, no. 4, pp. 258-267,Dec. 2010.
[4] Toussef, M., Youssef, A., and Younis, M.,” Overlapping multihop clustering for wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1844-1856, Dec. 2009.
[5] Younis, M., Ghumman, K., and Eltoweissy, M.,” Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 18, pp.865-882, Aug. 2006.
[6] Ngai E.C.H., and Lyu, M.R.,” An Authentication service based on trust and clustering in wireless ad hoc networks : description and security evaluation ,” in Proc. 2006 IEEE International Conf. Sensor Networks, Ubiquitous,Trustworthy Computing.
[7] Perrig, A., “The Biba one-time signature and broadcast authentication protocol,” in Proc. 2001 ACM Conf. Computer Commum. Security.
[8] Reyzin, L., and Reyzin, N., “Better than Biba: short one-time signatures with fast signing and verifying,” in Proc. 2002 Australian Conf. Info. Security Privacy, pp. 144-153.
[9] Perrig,A., Canetti, R., Tygar, J.D., Berkely, UC., Fountain, D., Watson, T.J., “ Efficient and secure source authentication for multicast,” in Proc. 2001 Network Distributed System Security Symposium.
Downloads
Published
Issue
Section
License
Authors need to sign following agreement with International Journal of MC Square Scientific Research before publishing their articles:
- Authors need to return copyright form to Journal Editor-in-chief to proceed their articles for publication. Meantime, the journal licensed under a Creative Commons Attribution License, which permits other user to distribute the work with an acknowledgement of the authors for International Journal of MC Square Scientific Research.
- Authors are also able to share their separate, additional contractual arrangements for the non-restricted contribution of the journal with an acknowledgement of publication in International Journal of MC Square Scientific Research.
- Authors are allowed and encouraged to share their work during the submission process for increasing citation and exploring to increase the paper availability in worldwide way. The Effect of Open Access.