Abstract
Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks are useful in various situations, where the time for planning of network deployment is not enough. They set on the fly concept. Most of the setups are unplanned. Some of the unplanned networks do not require high security, while some require more. As such networks are deployed without preparation, later may require additional nodes that will help in the ongoing activities. During the working of the network, some unwanted nodes may also try to get entry into the network. To grant entry to a genuine new node and to avoid unwanted nodes in the network, needs an initial-level authentication process that allows a new node to be part of the network. The paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Djenouri, D., Badache, N.: Survey on security issues in mobile ad hoc networks. IEEE Commun. Surv Tutor. 7, 1–4 (2005)
Rubinstein, M.G., Moraes, I.M., Campista, M.E., Costa, L.H., Durate, O.C.: A survey on wireless ad hoc networks. Mobile and Wireless Communication Networks, Springer, US, pp. 1–33 (2006)
Bing, W., Jianmin, C., Jie, W., Mihaela, C.: A Survey on Attacks and countermeasures in Mobile Ad Hoc Networks, pp. 103–135. Wireless Network Security Signals and Communication Technology, Springer, US (2007)
Ma, D., Gene, T.: Security and privacy in emerging wireless networks. IEEE Wireless Commun. 17(5), 12–21 (2010)
Eric, L.: Security in Wireless Ad Hoc Networks. Science Academy Transactions on Computer and Communication Networks, vol.1 (2011)
Pietro, R.D., Stefano, G., Nino, VV., Josep, D.-F.: Security in wireless ad-hoc networks–a survey. Comput. Commun. 51, 1–20 (2014)
Nisbet, A.: The challenges in implementing security in spontaneous ad hoc networks. In: 13th Australian Information Security Management Conference, pp. 112–119 (2015)
Gupta, P., Bansal, P.: A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks. In: 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS (2016)
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. Network and Distributed System Security Symposium, NDSS (2002)
Andreas, H., Jon, A., Thales, N.AS.: 2-level authentication mechanism in a internet connected MANET. In: 6th Scandinavian Workshop on Wireless Ad-hoc Networks (2005)
Seung, Yi., Albert, F., Harris, III., Robin, K.: Quality of authentication in ad hoc networks. A Technical Report Published in College of Engineering, Illinois (2008)
Naveed, A., Kanhere, S.S.: Authentication and Confidentiality in Wireless Ad Hoc Networks. A book Chapter in Security in Ad Hoc and Sensor Networks. World Scientific Press (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Gupta, P., Bansal, P. (2019). Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-6351-1_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6350-4
Online ISBN: 978-981-13-6351-1
eBook Packages: Computer ScienceComputer Science (R0)