scholarly journals Elliptic Curve Cryptography Based Security Protocol of MANET under Dynamic Cluster Head Selection Environment

Author(s):  
Srilakshmi R
Author(s):  
Pooja Verma

Integration procedures are employed to increase and enhance computing networks and their application domain. Extensive studies towards the integration of MANET with the internet have been studied and worked towards addressing various challenges for such integration. Some idyllic mechanisms always fail due to the presence of some nasty node or other problems such as face alteration and eavesdropping. The focus of this chapter is on the design and discovery of secure gateway scheme in MANET employing trust-based security factors such as route trust and load ability. Over these, the elliptic curve cryptography is applied to achieve confidentiality, integrity, and authentication while selecting optimum gateway node that has less bandwidth, key storage space, and faster computational time. Simulation results of the security protocol through SPAN for AVISPA tool have shown encouraging results over two model checkers namely OFMC and CL-AtSe.


2015 ◽  
Vol 48 ◽  
pp. 497-502 ◽  
Author(s):  
Akshay Kumar ◽  
Payal Pahwa ◽  
Deepali Virmani ◽  
Sahil ◽  
Vikas Rathi ◽  
...  

2019 ◽  
Vol 20 (2) ◽  
pp. 349-364
Author(s):  
S. Velliangiri ◽  
R. Rajagopal ◽  
P. Karthikeyan

In the Hybrid cloud deployment model, security is essential to restrict access while using resources such as virtual machine, platform, and application. Many protocols were developed to provide security via the cryptography technique, but these protocols rarely considered the trust factor which is an essential factor for cloud security. The existing Elliptic Curve Cryptography and Diffie Hellman key distribution mechanism failed to stress the trust factor, and further, they have provided not only higher complexity but also lower security and reliability. The proposed method comprised two stages: first stage, Group Creation using the trust factor and develop key distribution security protocol. It performs the communication process among the virtual machine communication nodes. Creating several groups based on the cluster and trust factors methods. The second stage, the ECC (Elliptic Curve Cryptography) based distribution security protocol is developed. The proposed Trust Factor Based Key Distribution Protocol reduced error rate, improve the key computation time and maximize resource utilization.


Author(s):  
Pooja Verma

Integration procedures are employed to increase and enhance computing networks and their application domain. Extensive studies towards the integration of MANET with the internet have been studied and worked towards addressing various challenges for such integration. Some idyllic mechanisms always fail due to the presence of some nasty node or other problems such as face alteration and eavesdropping. The focus of this chapter is on the design and discovery of secure gateway scheme in MANET employing trust-based security factors such as route trust and load ability. Over these, the elliptic curve cryptography is applied to achieve confidentiality, integrity, and authentication while selecting optimum gateway node that has less bandwidth, key storage space, and faster computational time. Simulation results of the security protocol through SPAN for AVISPA tool have shown encouraging results over two model checkers namely OFMC and CL-AtSe.


2016 ◽  
Vol 16 (8) ◽  
pp. 2746-2754 ◽  
Author(s):  
Dongyao Jia ◽  
Huaihua Zhu ◽  
Shengxiong Zou ◽  
Po Hu

Sign in / Sign up

Export Citation Format

Share Document