• Corpus ID: 7990950

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

@article{Kumar2016DesignAA,
  title={Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs},
  author={Adarsh Kumar and Krishna Gopal and Alok Aggarwal},
  journal={Int. J. Netw. Secur.},
  year={2016},
  volume={18},
  pages={1-18}
}
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor… 
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things
TLDR
In this work, Teo and Tan's circular hierarchical model is extended for dynamic group construction and lightweight primitives and protocols are integrated for security and results show that it provides strong authentication, confidentiality, forward and backward secrecies.
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs
TLDR
Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices and it is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks.
Simulation and cost analysis of group authentication protocols
TLDR
It is observed that high security in group proof construction is still infeasible, thus if security is required to be maximum then multi-round protocol should be preferred.
Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks
TLDR
The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS) attack and ensures cryptographic property, availability, in RFID-WSN integrated network through outlier Detection mechanism for 50 to 5000 nodes network.
An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
TLDR
To obtain a better understanding of various cryptographic and trust based security aspects, that forms an integral part of the solutions for issues in a clustered MANET, a study on such security features is provided.
An Identity Based Key Management Technique for Secure Routing in MANET
TLDR
From the results, it is analyzed that the PDR and throughput of the network is increased with the reduced message overhead and delay and the proposed mechanism uses the identity based key management technique, which efficiently detects the malicious nodes in the network.
A multi-domain trust management model for supporting RFID applications of IoT
TLDR
A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches and has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.
Secure routing in mobile Ad hoc networks: a predictive approach
TLDR
A proactive predictive approach to mitigate sequence number attacks which discovers misbehaving nodes during route discovery phase is proposed and suggests modifications in Ad hoc on-demand distance vector (AODV) routing protocol.
Study on Trust Model for Multi-users in Cloud Computing
  • Xu Wu
  • Computer Science
    Int. J. Netw. Secur.
  • 2018
TLDR
This work appears to be the first attempt to research the multi-entities trust management method in cloud computing based on trust level agreement and shows a significant improvement in comparison to traditional trust management technology.
A Novel and Efficient Anti-Collision Protocol for RFID Tag Identification
TLDR
Simulation annealing based anti-collision protocol is proposed where there is uniform distribution of channels among readers and preference is given to tag state parameters over fixed scheduling in order to increase the performance.
...
...

References

SHOWING 1-10 OF 88 REFERENCES
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks
TLDR
The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures and is well suited for low computational mobile devices with minimum delay.
RFID Distance Bounding Protocols with Mixed Challenges
TLDR
New distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2)n bound and which only require little memory are introduced.
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
TLDR
A forgery attack is presented that shows that a proof generated at time tn can be used to forge a valid proof for any desired time tj, which would rule out any possible improvement by increasing the length of the used PRNG.
Universally Composable RFID Identification and Authentication Protocols
TLDR
A universally composable security framework designed especially for RFID applications that supports modular deployment and a set of simple, efficient, secure, and anonymous RFID identification and authentication protocols that instantiate the proposed framework.
Authenticating Pervasive Devices with Human Protocols
TLDR
This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Lightweight RFID authentication with forward and backward security
TLDR
A lightweight RFID authentication protocol that supports forward and backward security and uses a pseudorandom number generator (PRNG) that is shared with the backend Server.
On Ultralightweight RFID Authentication Protocols
  • P. D'Arco, A. D. Santis
  • Computer Science, Mathematics
    IEEE Transactions on Dependable and Secure Computing
  • 2011
TLDR
The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques.
How secret-sharing can defeat terrorist fraud
TLDR
It is proved that secret sharing can counter terrorist fraud, and a method that can be applied directly to most existing distance bounding protocols is detailed, yielding two variants: the thresholddistance bounding (tdb) protocol and the thrifty threshold distance bounded protocol.
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
TLDR
This work utilizes the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFIDs systems with constant-time identification, and the existence of a large storage device in RFIDs, the database, is utilized for improving the time efficiency of tag identification.
Comparative study of trust and reputation systems for wireless sensor networks
TLDR
This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs and investigates the recent advances in TRM and includes a concise comparison of various TRMs.
...
...