ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

Journal: International Journal of Advanced Networking and Applications (Vol.2, No. 01)

Publication Date:

Authors : ; ;

Page : 464-469

Keywords : Adhoc network; key stream; MANET; quality of service; self secure;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.

Last modified: 2015-12-04 19:59:35