Open Access Open Access  Restricted Access Subscription Access

Disseminated Public-Key Management and Certificate Generation Scheme for MANET


Affiliations
1 Department of Master of Computer Applications, Sri Krishna Devaraya University, Anantapur, India
 

In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme:creation of public (and private) keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.

Keywords

Mobile Adhoc Network, Ubiquitous, Public Key, Assail Ability, Misbehaving Users.
User
Notifications
Font Size

Abstract Views: 124

PDF Views: 0




  • Disseminated Public-Key Management and Certificate Generation Scheme for MANET

Abstract Views: 124  |  PDF Views: 0

Authors

Sanjay Kumar Chowlam
Department of Master of Computer Applications, Sri Krishna Devaraya University, Anantapur, India
N. Geethanjali
Department of Master of Computer Applications, Sri Krishna Devaraya University, Anantapur, India

Abstract


In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme:creation of public (and private) keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.

Keywords


Mobile Adhoc Network, Ubiquitous, Public Key, Assail Ability, Misbehaving Users.