Open Access Open Access  Restricted Access Subscription or Fee Access

A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks

P. K. Manoj Kumar, K. S. Arya

Abstract


Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.

Keywords


Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.

Full Text:

PDF

References


. Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.

. Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002. 2002.

. Ramkumar, Mahalingam, and Nasir Memon. "An efficient key pre-distribution scheme for ad hoc network security." IEEE Journal on Selected Areas in Communications 23.3 (2005): 611-621.

. Gope, Prosanta. "Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks." Journal of Information Security and Applications 35 (2017): 160-167.

. Zhang, Rui, Jingchao Sun, Yanchao Zhang, and Xiaoxia Huang. "Jamming-resilient secure neighbor discovery in mobile ad hoc networks." IEEE Transactions on Wireless Communications 14, no. 10 (2015): 5588-5601.

. Narayana, V. Lakshman, and C. R. Bharathi. "IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS." Journal of Theoretical and Applied Information Technology 95.5 (2017): 1173.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.