ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 13-18

Keywords : Mobile Ad ho c network; Ad hoc on demand distance vector; secure ad hoc on demand distance vector; certificate Revocation list;

Source : Downloadexternal Find it from : Google Scholarexternal


Security is a major concern in mobile ad hoc network due to its various characteristics like infrastructure less nature, self configuring etc. Threshold cryptography used in key distribution of mobile ad hoc network enhances security by distributing each part of the divided secret key to each node. It is an effective technique as it refreshes the shares of each share holder periodically. It maintains the security by interchanging the shares among its share holders to prevent unauthorized access. In this paper w e are using Threshold cryptography concept on ad hoc on de mand distance vector routing protocol to increase the se curity of mobile ad hoc network. In this paper I propose a secured approach which I call secure ad hoc on demand distance vector and showing the behaviour of throughput, packet delivery ratio, average end to end delay and routing overhead of AODV and SAODV

Last modified: 2014-11-28 21:31:03