Downloads: 111
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 11, November 2015
A Cryptographical Approach for security in Mobile Adhoc Networks
R. Prasanna [15] | K. Balaji [3]
Abstract: Adhoc network is very popular due to their infrastructure less architecture. One main challenge in such networks is to provide security in communication where the hosts rely on each other to keep the network connected. This types of network suffers in passive eavesdropping, impersonation, replay attacks. To resist this type of attack we use secret sharing techniques based on CRT. In this paper we have proposed a two level key distribution scheme for adhoc networks. In the first level we use Knapsack algorithm for key distribution among the cluster heads and in the second level we use Chinese remainder theorem (CRT) to share the secret among the nodes of the cluster
Keywords: Authentication, Knapsack-public key cryptography, Asmuth-bloom secret sharing, Chinese remainder theorem CRT
Edition: Volume 4 Issue 11, November 2015,
Pages: 1273 - 1276
Similar Articles with Keyword 'Authentication'
Downloads: 88
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1471 - 1476HMAC Based Secure Authentication of VANETs
Swagat. S. Gudagudi | Dr. Veena Desai
Downloads: 101
Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1054 - 1061Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade | Dimple Chaudhari [2]