ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Cryptographical Approach for security in Mobile Adhoc Networks

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1273-1276

Keywords : Authentication; Knapsack-public key cryptography; Asmuth-bloom secret sharing; Chinese remainder theorem CRT;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Adhoc network is very popular due to their infrastructure less architecture. One main challenge in such networks is to provide security in communication where the hosts rely on each other to keep the network connected. This types of network suffers in passive eavesdropping, impersonation, replay attacks. To resist this type of attack we use secret sharing techniques based on CRT. In this paper we have proposed a two level key distribution scheme for adhoc networks. In the first level we use Knapsack algorithm for key distribution among the cluster heads and in the second level we use Chinese remainder theorem (CRT) to share the secret among the nodes of the cluster

Last modified: 2021-07-01 14:26:37