Improving authentication mechanism for using extended public key cryptography in mobile adhoc network  

Abstract

Mobile ad hoc network is a special kind of wireless networks formed without any centralized administration. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among all nodes in underlying protocol design and lack of centralized monitoring and management point. The main aim of this work is to provide secure data transmission between the source and destination. The proposed mechanism will authenticate the node and ensure the security of important routing information in AODV protocol 

Authors and Affiliations

Mr. Sandip A. Kahate , Mr. Onkar V. Chandure

Keywords

Related Articles

Development and Verification of VHDL code for 16 bit ADC for FPGA based Beam Position Measurement Board  

FPGA based designed card provide several advantages over custom designed IC based cards such as reduced cost, reduction in components, reduction in size ,easily coded . It is flexible because its parameters can be...

“A Survey on Different Fingerprint Recognition Systems” 

In this paper we are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here we are comparing various methods using minutiae features only or ridge features o...

Improving P2P Performance by Applying Proper Replica Placement Strategies 

One among the several emerging distributed computing systems is Peer-to-Peer (P2P) systems that provide a platform for large internet scale distributed applications, with no dedicated infrastructure, develops distr...

A Resolved Retrieval Technique For Software Components  

t___Retrieval is a major area in software repository because reuse is only effective if it is easier to locate than to write from scratch. In this paper we are describing the classical methods for retrieving the...

Correlation Preserved Indexing Based Approach For Document Clustering 

Document clustering is the act of collecting similar documents into clusters, where similarity is some function on a document. Document clustering method achieves 1) a high accuracy for documents 2) document fre...

Download PDF file
  • EP ID EP136079
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Mr. Sandip A. Kahate, Mr. Onkar V. Chandure (2013). Improving authentication mechanism for using extended public key cryptography in mobile adhoc network  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(4), 1322-1329. https://www.europub.co.uk/articles/-A-136079