![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks
Subscribe/Renew Journal
Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.
Keywords
Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.
User
Subscription
Login to verify subscription
Font Size
Information
- . Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
- . Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002. 2002.
- . Ramkumar, Mahalingam, and Nasir Memon. "An efficient key pre-distribution scheme for ad hoc network security." IEEE Journal on Selected Areas in Communications 23.3 (2005): 611-621.
- . Gope, Prosanta. "Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks." Journal of Information Security and Applications 35 (2017): 160-167.
- . Zhang, Rui, Jingchao Sun, Yanchao Zhang, and Xiaoxia Huang. "Jamming-resilient secure neighbor discovery in mobile ad hoc networks." IEEE Transactions on Wireless Communications 14, no. 10 (2015): 5588-5601.
- . Narayana, V. Lakshman, and C. R. Bharathi. "IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS." Journal of Theoretical and Applied Information Technology 95.5 (2017): 1173.
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 281
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 0