Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
@article{Kumar2016DesignAA, title={Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs}, author={Adarsh Kumar and Krishna Gopal and Alok Aggarwal}, journal={Int. J. Netw. Secur.}, year={2016}, volume={18}, pages={1-18} }
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor…
Figures and Tables from this paper
17 Citations
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things
- Computer ScienceInt. J. Adv. Intell. Paradigms
- 2017
In this work, Teo and Tan's circular hierarchical model is extended for dynamic group construction and lightweight primitives and protocols are integrated for security and results show that it provides strong authentication, confidentiality, forward and backward secrecies.
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs
- Computer ScienceISDA
- 2018
Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices and it is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks.
Simulation and cost analysis of group authentication protocols
- Computer Science2016 Ninth International Conference on Contemporary Computing (IC3)
- 2016
It is observed that high security in group proof construction is still infeasible, thus if security is required to be maximum then multi-round protocol should be preferred.
Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks
- Computer ScienceInternational journal of Computer Networks & Communications
- 2018
The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS) attack and ensures cryptographic property, availability, in RFID-WSN integrated network through outlier Detection mechanism for 50 to 5000 nodes network.
An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
- Computer ScienceInt. J. Netw. Secur.
- 2018
To obtain a better understanding of various cryptographic and trust based security aspects, that forms an integral part of the solutions for issues in a clustered MANET, a study on such security features is provided.
An Identity Based Key Management Technique for Secure Routing in MANET
- Computer ScienceInternational Journal of Intelligent Engineering and Systems
- 2018
From the results, it is analyzed that the PDR and throughput of the network is increased with the reduced message overhead and delay and the proposed mechanism uses the identity based key management technique, which efficiently detects the malicious nodes in the network.
A multi-domain trust management model for supporting RFID applications of IoT
- Computer Science, BusinessPloS one
- 2017
A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches and has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.
Secure routing in mobile Ad hoc networks: a predictive approach
- Computer Science
- 2019
A proactive predictive approach to mitigate sequence number attacks which discovers misbehaving nodes during route discovery phase is proposed and suggests modifications in Ad hoc on-demand distance vector (AODV) routing protocol.
Study on Trust Model for Multi-users in Cloud Computing
- Computer ScienceInt. J. Netw. Secur.
- 2018
This work appears to be the first attempt to research the multi-entities trust management method in cloud computing based on trust level agreement and shows a significant improvement in comparison to traditional trust management technology.
A Novel and Efficient Anti-Collision Protocol for RFID Tag Identification
- Computer Science
- 2016
Simulation annealing based anti-collision protocol is proposed where there is uniform distribution of channels among readers and preference is given to tag state parameters over fixed scheduling in order to increase the performance.
References
SHOWING 1-10 OF 88 REFERENCES
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks
- Computer ScienceIC3
- 2012
The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures and is well suited for low computational mobile devices with minimum delay.
RFID Distance Bounding Protocols with Mixed Challenges
- Computer ScienceIEEE Transactions on Wireless Communications
- 2011
New distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2)n bound and which only require little memory are introduced.
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
- Mathematics, Computer ScienceIACR Cryptol. ePrint Arch.
- 2013
A forgery attack is presented that shows that a proof generated at time tn can be used to forge a valid proof for any desired time tj, which would rule out any possible improvement by increasing the length of the used PRNG.
Universally Composable RFID Identification and Authentication Protocols
- Computer Science, MathematicsTSEC
- 2009
A universally composable security framework designed especially for RFID applications that supports modular deployment and a set of simple, efficient, secure, and anonymous RFID identification and authentication protocols that instantiate the proposed framework.
Authenticating Pervasive Devices with Human Protocols
- Computer ScienceCRYPTO
- 2005
This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Lightweight RFID authentication with forward and backward security
- Computer Science, MathematicsTSEC
- 2011
A lightweight RFID authentication protocol that supports forward and backward security and uses a pseudorandom number generator (PRNG) that is shared with the backend Server.
On Ultralightweight RFID Authentication Protocols
- Computer Science, MathematicsIEEE Transactions on Dependable and Secure Computing
- 2011
The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques.
How secret-sharing can defeat terrorist fraud
- Computer Science, MathematicsWiSec '11
- 2011
It is proved that secret sharing can counter terrorist fraud, and a method that can be applied directly to most existing distance bounding protocols is detailed, yielding two variants: the thresholddistance bounding (tdb) protocol and the thrifty threshold distance bounded protocol.
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
- Computer ScienceIEEE Transactions on Parallel and Distributed Systems
- 2012
This work utilizes the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFIDs systems with constant-time identification, and the existence of a large storage device in RFIDs, the database, is utilized for improving the time efficiency of tag identification.
Comparative study of trust and reputation systems for wireless sensor networks
- Computer ScienceSecur. Commun. Networks
- 2013
This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs and investigates the recent advances in TRM and includes a concise comparison of various TRMs.