Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arya, K. S.
- A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Nehru Arts and Science College, IN
2 Department of Computer Science, Nehru Arts and Science College, IN
1 Department of Information Technology, Nehru Arts and Science College, IN
2 Department of Computer Science, Nehru Arts and Science College, IN
Source
Wireless Communication, Vol 10, No 1 (2018), Pagination: 12-13Abstract
Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.Keywords
Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.References
- . Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
- . Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002. 2002.
- . Ramkumar, Mahalingam, and Nasir Memon. "An efficient key pre-distribution scheme for ad hoc network security." IEEE Journal on Selected Areas in Communications 23.3 (2005): 611-621.
- . Gope, Prosanta. "Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks." Journal of Information Security and Applications 35 (2017): 160-167.
- . Zhang, Rui, Jingchao Sun, Yanchao Zhang, and Xiaoxia Huang. "Jamming-resilient secure neighbor discovery in mobile ad hoc networks." IEEE Transactions on Wireless Communications 14, no. 10 (2015): 5588-5601.
- . Narayana, V. Lakshman, and C. R. Bharathi. "IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS." Journal of Theoretical and Applied Information Technology 95.5 (2017): 1173.
- Occurrence of White Gelatinous Foam on the Beaches of Kollam (Southwest Coast of India) Due to the Senescent Bloom of Phaeocystis Globosa
Abstract Views :215 |
PDF Views:68
Authors
N. V. Madhu
1,
P. Anil
1,
C. R. Vishal
1,
K. R. Muraleedharan
1,
A. Parvathi
1,
T. Gireesh Kumar
1,
K. S. Arya
1,
S. Hafza
1
Affiliations
1 CSIR-National Institute of Oceanography, Regional Centre, Kochi 682 018, IN
1 CSIR-National Institute of Oceanography, Regional Centre, Kochi 682 018, IN