Review of MANETS Using Distributed Public-key Cryptography

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-10 Number-3                          
Year of Publication : 2014
Authors : Ms. Rajni , Ms. Reena
DOI :  10.14445/22312803/IJCTT-V10P124


Ms. Rajni , Ms. Reena."Review of MANETS Using Distributed Public-key Cryptography". International Journal of Computer Trends and Technology (IJCTT) V10(3):143-147, Apr 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment.

[1]Deng, Hongmei, Wei Li, and Dharma P. Agrawal. "Routing security in wireless ad hoc networks."Communications Magazine, IEEE 40, no. 10 (2002): 70-75.
[2] Samba Sessay, Zongkai Yang and JianhuaHe ,”A Survey on Mobile Ad Hoc Wireless Network, ” Information Technology Journal 3(2):168-175, 2004.
[3] Van der Merwe, J., Dawoud, D., and McDonald, “ A survey on peer-to-peer key management for mobile ad hoc networks,” ACM Comput. Surv. 39, 1, Article 1 , April 2007.
[4] JeroenHoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester,” An Overview of Mobile Ad Hoc Networks: Applications and Challenges ,” Journal of the Communications Network Volume 3, Issue 3, June 2004.
[5] Hegland, Anne Marie, Eli Winjum, StigFrMjølsnes, ChunmingRong, Øivind Kure, and Pål Spilling. "A survey of key management in ad hoc networks."IEEE Communications Surveys and Tutorials 8, no. 1-4 (2006): 48-66.
[6] Cheng-Chi Lee and Chin-Ling Chen,” Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings,” International Conference on E-Business and E-Government, 978-0-7695-3997, Oct. 3, 2010.
[7] Wan AnXiong, Bin Tang,” A Secure and Highly Efficient Key Management Scheme for MANET,” Advances on Information Sciences and Service Sciences. Volume 3, Number 2, March 2011.
[8] Eduardo Da Silva, Aldri L. Dos Santos, and Luiz Carlos P. Albini,” Identity-based Key Management in Mobile Ad hoc Networks: Techniques and Applications,” IEEE Wireless Communications, 1536-1284, Aug. 2008.
[9] Kapil, Anil, and Sanjeev Rana. "Identity-Based Key Management in MANETs using Public Key Cryptography." International Journal of Security (IJS) 3.1 (2009)
[10] Zhang, Yanchao, et al. "AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks." Communications, 2005. ICC 2005. 2005 IEEE International Conference on. Vol. 5. IEEE, 2005.

MANETS, Public key Cryptography, Key Management.Network Security.