Skip to main content

Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network

  • Chapter
  • First Online:
Data, Engineering and Applications
  • 911 Accesses

Abstract

Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks are useful in various situations, where the time for planning of network deployment is not enough. They set on the fly concept. Most of the setups are unplanned. Some of the unplanned networks do not require high security, while some require more. As such networks are deployed without preparation, later may require additional nodes that will help in the ongoing activities. During the working of the network, some unwanted nodes may also try to get entry into the network. To grant entry to a genuine new node and to avoid unwanted nodes in the network, needs an initial-level authentication process that allows a new node to be part of the network. The paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Djenouri, D., Badache, N.: Survey on security issues in mobile ad hoc networks. IEEE Commun. Surv Tutor. 7, 1–4 (2005)

    Google Scholar 

  2. Rubinstein, M.G., Moraes, I.M., Campista, M.E., Costa, L.H., Durate, O.C.: A survey on wireless ad hoc networks. Mobile and Wireless Communication Networks, Springer, US, pp. 1–33 (2006)

    Google Scholar 

  3. Bing, W., Jianmin, C., Jie, W., Mihaela, C.: A Survey on Attacks and countermeasures in Mobile Ad Hoc Networks, pp. 103–135. Wireless Network Security Signals and Communication Technology, Springer, US (2007)

    Google Scholar 

  4. Ma, D., Gene, T.: Security and privacy in emerging wireless networks. IEEE Wireless Commun. 17(5), 12–21 (2010)

    Google Scholar 

  5. Eric, L.: Security in Wireless Ad Hoc Networks. Science Academy Transactions on Computer and Communication Networks, vol.1 (2011)

    Google Scholar 

  6. Pietro, R.D., Stefano, G., Nino, VV., Josep, D.-F.: Security in wireless ad-hoc networks–a survey. Comput. Commun. 51, 1–20 (2014)

    Google Scholar 

  7. Nisbet, A.: The challenges in implementing security in spontaneous ad hoc networks. In: 13th Australian Information Security Management Conference, pp. 112–119 (2015)

    Google Scholar 

  8. Gupta, P., Bansal, P.: A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks. In: 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS (2016)

    Google Scholar 

  9. Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. Network and Distributed System Security Symposium, NDSS (2002)

    Google Scholar 

  10. Andreas, H., Jon, A., Thales, N.AS.: 2-level authentication mechanism in a internet connected MANET. In: 6th Scandinavian Workshop on Wireless Ad-hoc Networks (2005)

    Google Scholar 

  11. Seung, Yi., Albert, F., Harris, III., Robin, K.: Quality of authentication in ad hoc networks. A Technical Report Published in College of Engineering, Illinois (2008)

    Google Scholar 

  12. Naveed, A., Kanhere, S.S.: Authentication and Confidentiality in Wireless Ad Hoc Networks. A book Chapter in Security in Ad Hoc and Sensor Networks. World Scientific Press (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praveen Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, P., Bansal, P. (2019). Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6351-1_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6350-4

  • Online ISBN: 978-981-13-6351-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics