Visible to the public Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)

TitlePublic String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Publication TypeConference Paper
Year of Publication2018
AuthorsChauhan, Gargi K, Patel, Saurabh M
Conference Name2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)
Keywordsad hoc network, compositionality, data privacy, default threshold value, denial of service, denial-of-service attack, MANET, manet privacy, message privacy, Metrics, mobile ad hoc network, mobile ad hoc networks, PSTC, pubcrawl, Public key, public key cryptography, public string based threshold cryptography, Receivers, resilience, Resiliency, robust cryptography scheme, Servers, space analysis, telecommunication security, threshold cryptography, time analysis, trust value, wireless technology
AbstractCommunication is an essential part of everyday life, both as a social interaction and collaboration to achieve goals. Wireless technology has effectively release the users to roam more freely to achieving collaboration and communication. The principle attraction of mobile ad hoc networks (MANET) are their set-up less and decentralized action. However, mobile ad hoc networks are seen as relatively easy targets for attackers. Security in mobile ad hoc network is provided by encrypting the data when exchanging messages and key management. Cryptography is therefore vital to ensure privacy of message and robustness against disruption. The proposed scheme public string based threshold cryptography (PSTC) describes the new scheme based on threshold cryptography that provides reasonably secure and robust cryptography scheme for mobile ad hoc networks. The scheme is implemented and simulated in ns-2. The scheme is based on trust value and analyze against Denial of Service attack as node found the attacker, the node reject all packet from that attacker. In proposed scheme whole network is compromised only when all nodes of network is compromised because threshold nodes only sharing public string not the master private key. The scheme provides confidentiality and integrity. The default threshold value selected is 2 according to time and space analysis.
Citation Keychauhan_public_2018