The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Implementing security in mobile ad hoc networks is very challenging due to its dynamic, heterogeneous and distributed nature. In order to deploy security most important pre requisite is ‘authentication’. However, providing security based on public key infrastructure with central third party authentication is difficult to deploy in MANETs Environment. Energy efficiency is another powerful factor due to its constrained battery power of nodes in MANETs. Methods/Analysis: In order to achieve security along with energy efficiency, we design & evaluate mechanism based on chaotic maps and knapsack algorithm, which addresses two vital characteristics: authentication & lifetime of network. We divide the MANETs into number of clusters with cluster heads and assign the key management task to cluster heads. Findings: Proposed work achieves the network life time based on new metric called ‘Optimized data packets processing capacity’ and authentication with the help of Chebyshev polynomials. Application/Improvements: Our proposed scheme abstains from computing overhead such as modular exponentiation and scalar multiplications of an elliptical curve. Moreover it is robust to different network attacks and assures that the secrete session key is established only between two intended entities.

Keywords

Authentication, Cluster, Chebyshev Polynomials, Key Agreement, MANETs, Optimization.
User