Review of MANETS Using Distributed Public-key Cryptography

  title={Review of MANETS Using Distributed Public-key Cryptography},
  author={Ms. Rajni and M. Reena},
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for… Expand
Key Management Schemes in MANET: A Review
The examination on different sorts of key administration plans with their uncommon highlights is introduced, chiefly because of their straightforward key administration process and decreased memory stockpiling cost. Expand
A trading model and security regime for mobile e-commerce via ad hoc wireless networking
P2P identity support scheme using PGP certificates; a distributed reputation system backed by sanctions; a group membership service based on membership vouchers, quorate decisions by some group members and partial membership lists; and a security warning scheme are explored. Expand
State of the art of MANETs in respect of using UWB Systems at MAC and Routing Layer for improving Quality of Service: Review
A Mobile Ad-hoc NETwork (MANET) is formed by the connection of wireless devices without the aid of third party intervention, existing network infrastructure or applications. Many ideas and resourcesExpand


Identity-Based Key Management in MANETs using Public Key Cryptography
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology andExpand
A Secure and Highly Efficient Key Management Scheme for MANET
This paper adopts Identities (ID)-based cryptography with threshold secret sharing, ECC and Bilinear Pairing computation to construct tree structure and cluster structure ad hoc network and then gives out a three-level security communication ad hocnetwork. Expand
A survey of key management in ad hoc networks
The state of the art within key management for ad hoc networks is surveyed, and their applicability for network-layer security is analyzed, as this work was initiated by a study of security in MANETs for emergency and rescue operations. Expand
Identity-based key management in mobile ad hoc networks: techniques and applications
This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features, and presents the main ID- based key management application fields on MANETs. Expand
AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks
This paper proposes a novel anonymous and certificateless public-key infrastructure (AC-PKI) for ad hoc networks, and determines the optimal secret-sharing parameters to achieve the maximum security. Expand
Routing security in wireless ad hoc networks
This article studies the routing security issues of MANETs, and analyzes in detail one type of attack-the "black hole" problem-that can easily be employed against the MANets, and proposes a solution for the black hole problem for ad hoc on-demand distance vector routing protocol. Expand
Authenticated Multiple Keys Exchange Protocol Based on Bilinear Pairings
This paper shall extend protocols to establish 36 common session keys in each round of key agreement protocol, based on bilinear pairings, and the security and efficiency of the proposed protocol are presented. Expand
A Survey on Mobile Ad Hoc Wireless Network
The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible. Expand
An Overview of Mobile Ad Hoc Networks for Existing Protocols and Applications
The more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks. Expand
A survey on peer-to-peer key management for mobile ad hoc networks
The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs) and discusses and provides comments on the strategy of each group separately. Expand