Open Access Open Access  Restricted Access Subscription Access

Code based Secret Sharing Schemes for MANET


Affiliations
1 Department of H&S, VNR VJIET, Hyderabad, India
2 Department of Computer Science and Engineering, VNRVJIET, Hyderabad, India
3 CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, India
 

Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Shamir`s proposal is well known prominent secret sharing schemes. But it does not provide a dynamic approach to the particular application. In the same distribution process nodes may join or leave the network and able to obtain the similar capabilities as initial nodes; further, the joined nodes gain the shares (updated shares) corresponding to the secret. Two additional features of proposed system are that it allows to implement threshold operations, one for distributing secret information with other nodes and the other is using our threshold schemes in key management. Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Proposed the group key establishment protocol operations in detail and also proposed two different methods for dealing network dynamic nature including adding and removing of the nodes.

Keywords

Interpolation, Key Generation, Key Management, MANETs, Threshold, Secret Sharing.
User

Abstract Views: 214

PDF Views: 0




  • Code based Secret Sharing Schemes for MANET

Abstract Views: 214  |  PDF Views: 0

Authors

Padmavathi Guddeti
Department of H&S, VNR VJIET, Hyderabad, India
P. V. Siva Kumar
Department of Computer Science and Engineering, VNRVJIET, Hyderabad, India
Appala Naidu Tentu
CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, India

Abstract


Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Shamir`s proposal is well known prominent secret sharing schemes. But it does not provide a dynamic approach to the particular application. In the same distribution process nodes may join or leave the network and able to obtain the similar capabilities as initial nodes; further, the joined nodes gain the shares (updated shares) corresponding to the secret. Two additional features of proposed system are that it allows to implement threshold operations, one for distributing secret information with other nodes and the other is using our threshold schemes in key management. Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Proposed the group key establishment protocol operations in detail and also proposed two different methods for dealing network dynamic nature including adding and removing of the nodes.

Keywords


Interpolation, Key Generation, Key Management, MANETs, Threshold, Secret Sharing.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i39%2F126386