PROVISIONING OF EFFICIENT AUTHENTICATION TECHNIQUE FOR IMPLEMENTING IN LARGE SCALE NETWORKS (PEAT)

Authors

  • Lingeshwari S

DOI:

https://doi.org/10.20894/IJMSR.117.006.001.006

Keywords:

Secret key Management, Elliptical Curve Cryptography technique, Wireless Sensor Network.

Abstract

Increasing attractiveness of Ad-hoc Networks, its quality and treatment has guide in the introduction of threats and attacks to bring negative consequences in the society. The typical features of ad hoc network, particularly with dynamic topology and open wireless medium, may lead network afflicted with some refuge vulnerabilities. The main challenge in designing an ad hoc network is to build them protective from different attacks in the network. The authentication must be done without much delay and should independent of the other packets. In this system we propose, Provisioning of Efficient Authentication Technique for Implementing in Large Scale Networks (PEAT). Here the Clusters are formed based on the distance and the Cluster Heads (CHs) are elected by coverage and connectivity. The secret key generation used to form the clusters securely. The CH first checks the cluster members’ secret key then formed the clusters. The Elliptical Curve Cryptography technique verifies the CH is authenticated or not. Hence, source sends the data to authenticated CH in the network. Simulation results shows that the PEAT perform better amount of data received also reduce the delay in the network.

Downloads

Download data is not yet available.

Author Biography

Lingeshwari S

PG Scholar, Department of CSE, PSN Engineering College, Tirunelveli, Tamil nadu.

References

[1] Younis, M.,”TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks” IEEE Transactions On Network And Service Management, Vol. 9, No. 1, March 2012 .

[2] Azarderskhsh, R., and Masoleh, A., “Secure clustering and symmetric Key establishment in heterogeneous wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, 2011.

[3] Yu, F.R, Tang, H., Mason, P., and Wang, F.,” A hierarchical identity based key management scheme in tactical mobile ad hoc networks,” IEEE Trans. Netw. Service Management,vol. 7, no. 4, pp. 258-267,Dec. 2010.

[4] Toussef, M., Youssef, A., and Younis, M.,” Overlapping multihop clustering for wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1844-1856, Dec. 2009.

[5] Younis, M., Ghumman, K., and Eltoweissy, M.,” Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 18, pp.865-882, Aug. 2006.

[6] Ngai E.C.H., and Lyu, M.R.,” An Authentication service based on trust and clustering in wireless ad hoc networks : description and security evaluation ,” in Proc. 2006 IEEE International Conf. Sensor Networks, Ubiquitous,Trustworthy Computing.

[7] Perrig, A., “The Biba one-time signature and broadcast authentication protocol,” in Proc. 2001 ACM Conf. Computer Commum. Security.

[8] Reyzin, L., and Reyzin, N., “Better than Biba: short one-time signatures with fast signing and verifying,” in Proc. 2002 Australian Conf. Info. Security Privacy, pp. 144-153.

[9] Perrig,A., Canetti, R., Tygar, J.D., Berkely, UC., Fountain, D., Watson, T.J., “ Efficient and secure source authentication for multicast,” in Proc. 2001 Network Distributed System Security Symposium.

Downloads

Published

2014-12-17

Issue

Section

Articles