Disseminated Public-Key Management and Certificate Generation Scheme for MANET
Journal: International Journal of Advanced Networking and Applications (Vol.3, No. 01)Publication Date: 2011-07-04
Authors : Sanjay Kumar Chowlam; N. Geethanjali;
Page : 1012-1016
Keywords : Mobile Adhoc Network; Ubiquitous; Public key; Assail ability; Misbehaving Users;
Abstract
In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made
it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme: creation of public (and private) keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.
Other Latest Articles
- Performance Analysis of Hierarchical Clustering Algorithm
- Challenges in maximizing the life of Wireless Sensor Network
- An Efficient Parallel Algorithm of Modified Jacobi Approach for Sparse Linear System
- Detection Architecture of Application Layer DDoS Attack for Internet
- Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web
Last modified: 2015-12-04 16:22:58