Corpus ID: 7990950

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

@article{Kumar2016DesignAA,
  title={Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs},
  author={Adarsh Kumar and K. Gopal and A. Aggarwal},
  journal={Int. J. Netw. Secur.},
  year={2016},
  volume={18},
  pages={1-18}
}
  • Adarsh Kumar, K. Gopal, A. Aggarwal
  • Published 2016
  • Computer Science
  • Int. J. Netw. Secur.
  • Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor… CONTINUE READING
    16 Citations
    Simulation and cost analysis of group authentication protocols
    • 3
    An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
    • 1
    • PDF
    An Identity Based Key Management Technique for Secure Routing in MANET
    • 1
    • PDF
    A multi-domain trust management model for supporting RFID applications of IoT
    • 8
    • PDF
    Study on Trust Model for Multi-users in Cloud Computing
    • X. Wu
    • Computer Science
    • Int. J. Netw. Secur.
    • 2018
    • 6
    • PDF
    A Novel and Efficient Anti-Collision Protocol for RFID Tag Identification
    • 1

    References

    SHOWING 1-10 OF 89 REFERENCES
    Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks
    • 8
    RFID Distance Bounding Protocols with Mixed Challenges
    • C. Kim, G. Avoine
    • Computer Science
    • IEEE Transactions on Wireless Communications
    • 2011
    • 49
    • PDF
    Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
    • 8
    • PDF
    Universally Composable RFID Identification and Authentication Protocols
    • 76
    • PDF
    Authenticating Pervasive Devices with Human Protocols
    • 745
    • PDF
    Lightweight RFID authentication with forward and backward security
    • 46
    • PDF
    On Ultralightweight RFID Authentication Protocols
    • P. D'Arco, A. Santis
    • Computer Science
    • IEEE Transactions on Dependable and Secure Computing
    • 2011
    • 74
    • PDF
    How secret-sharing can defeat terrorist fraud
    • 47
    • PDF
    Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
    • 40
    • PDF
    Comparative study of trust and reputation systems for wireless sensor networks
    • 87
    • PDF