Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/300775
Title: Group key authentication based identity management for trust based and energy efficient defense against attacks on MANET
Researcher: Prasanna S
Guide(s): Balaji N
Keywords: Engineering and Technology
Computer Science
Group key authentication based
Energy Efficient Defense
Mobile Ad Hoc Network
University: Anna University
Completed Date: 2019
Abstract: Mobile Ad Hoc Network MANET is a dynamic networking system that facilitates an exchange of data between mobile devices without the support of wireless access points and base stations Instead each device in MANET act as client and server So it becomes hot research topic among researchers Providing secure communication is one of the major research avenues in MANETs because of the dynamic topology due to mobility and energy constraint In recent years secure group communication technique has become an important research issue for protecting communication security among the participants Authenticated Identity Management is an efficient security mechanism that provides secure group communication and mutual authentication for the participants First energy efficient cluster head selection in MANET is proposed The cluster head is selected based on the proposed algorithms Vice Low Energy Adaptive Clustering Hierarchy V LEACH and Particle Swam Optimization PSO Algorithm To implement the V LEACH protocol using Network Simulator NS 2 35 and V LEACH protocol is compared with LEACH protocol V LEACH transmit data from one cluster head to another cluster head communication using PSO algorithm This Protocol is designed for 6 intercluster each cluster contains 15 nodes one base station node for receiving the packet from cluster head Secondly trust based group key distribiution using authentication based broadcast encryption is proposed The challenge lies in secure distribution of the key to the participants and managing key The processes involved in group key management are Key generation Key distribution Key updation and Key revocation Forward secrecy and backward secrecy has to be obtained newline
Pagination: p.105-116
URI: http://hdl.handle.net/10603/300775
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File9.55 kBAdobe PDFView/Open
02_certificates.pdf462.52 kBAdobe PDFView/Open
03_abstracts.pdf7.63 kBAdobe PDFView/Open
04_acknowledgements.pdf193.82 kBAdobe PDFView/Open
05_contents.pdf13.92 kBAdobe PDFView/Open
06_listoftables.pdf4.12 kBAdobe PDFView/Open
07_listoffigures.pdf8.28 kBAdobe PDFView/Open
08_listofabbreviations.pdf11.63 kBAdobe PDFView/Open
09_chapter1.pdf232.88 kBAdobe PDFView/Open
10_chapter2.pdf183.61 kBAdobe PDFView/Open
11_chapter3.pdf292.1 kBAdobe PDFView/Open
12_chapter4.pdf406.73 kBAdobe PDFView/Open
13-chapter5.pdf331.58 kBAdobe PDFView/Open
14_chapter6.pdf114.76 kBAdobe PDFView/Open
15_conclusion.pdf5.67 kBAdobe PDFView/Open
16_references.pdf135.17 kBAdobe PDFView/Open
17_listofpublications.pdf69.08 kBAdobe PDFView/Open
80_recommendation.pdf88.87 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: