원문정보
초록
영어
Adhoc network is basically infrastructure less in nature and it is vulnerable to attacks. In such a network it is necessary to create the security autonomously without the involvement of centralized architecture. Address allocation, name resolution, services rendering, authentication and access control policies represent some of the functionalities that are supported by the Adhoc Networks. To solve the above issue, a novel security protocol is proposed for the Passionate network formation. Initial network formation done based on trust. For each newly added user authorization is performed using certificate generation. Authentication is carried out using certificate verification mechanism. Session key is used by all the nodes in the network, for the defended communication. Symmetric key encryption is used for data encryption. Asymmetric cryptography is used for session key encryption and signature generation. Session key updating is carried out based on expiration time. To revoke the attacker from participating in the network, User revocation mechanism is contributed to the proposed security protocol. Security is enhanced with revocation capabilities.
목차
1. Introduction
2. Related Work
3. Passionate Network Formation
3.1. Overview of a Network
3.2. Network Formation
4. Protocol and Network Management
4.1. Operation of Protocol
4.2. Session Key Updation and Revocation
4.3. Malicious Node/User Revocation
5. Performance Analysis
5.1. Memory Consumption during Network Formation
6. Conclusion
References
