Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks


Affiliations
1 Department of Information Technology, Nehru Arts and Science College, India
2 Department of Computer Science, Nehru Arts and Science College, India
     

   Subscribe/Renew Journal


Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.

Keywords

Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.
User
Subscription Login to verify subscription
Notifications
Font Size

  • . Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
  • . Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002. 2002.
  • . Ramkumar, Mahalingam, and Nasir Memon. "An efficient key pre-distribution scheme for ad hoc network security." IEEE Journal on Selected Areas in Communications 23.3 (2005): 611-621.
  • . Gope, Prosanta. "Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks." Journal of Information Security and Applications 35 (2017): 160-167.
  • . Zhang, Rui, Jingchao Sun, Yanchao Zhang, and Xiaoxia Huang. "Jamming-resilient secure neighbor discovery in mobile ad hoc networks." IEEE Transactions on Wireless Communications 14, no. 10 (2015): 5588-5601.
  • . Narayana, V. Lakshman, and C. R. Bharathi. "IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS." Journal of Theoretical and Applied Information Technology 95.5 (2017): 1173.

Abstract Views: 168

PDF Views: 0




  • A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks

Abstract Views: 168  |  PDF Views: 0

Authors

P. K. Manoj Kumar
Department of Information Technology, Nehru Arts and Science College, India
K. S. Arya
Department of Computer Science, Nehru Arts and Science College, India

Abstract


Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.

Keywords


Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.

References