Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network
Journal: International Journal of Advanced Networking and Applications (Vol.2, No. 01)Publication Date: 2010-07-05
Authors : T.Surya Prakash Reddy; T. Sunil Kumar Reddy;
Page : 464-469
Keywords : Adhoc network; key stream; MANET; quality of service; self secure;
Abstract
A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.
Other Latest Articles
- Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms
- Channel Allocation Scheme in Cellular System
- Comparisons of SAODV and TAODV, DSR Mobile ad hoc network Routing Protocols
- A New Security on Neural Cryptography with Queries
- Reducing Latency by Providing Location Based Services using Hybrid Cache in Ad Hoc Networks
Last modified: 2015-12-04 19:59:35