Abstract
In 2010, an efficient authentication protocol has been proposed for virtual subnets on Mobile Adhoc Networks (MANET). It uses virtual subnet and each node in the subnet is authenticated using certificate. Further, it is claimed that protocol is robust, more efficient and practical. However, it is not suitable for devices have low computation power like mobile, PDAs, smart cards because number of computations are more in RSA based cryptosystem. In order to reduce the number of computation with same level of security, this paper proposes the same scheme using Elliptic Curve Cryptography (ECC) (modified scheme). Our scheme uses ECC in place of RSA to reduce number of computations with shorter key size.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aziz, B., Nourdine, E., Mohamed, E.-K.: A Recent Survey on Key Management Schemes in MANET. In: ICTTA 2008, pp. 1–6 (2008)
Perkins, C.: Ad Hoc Networks. Addison-Wesley, Reading (2001)
Rajaravivarma, V.: Virtual Local area Network Technology and Applications. In: Proceeding of the Twenty-Ninth Southeastern Symposium, March 9-11, pp. 49–52 (1997)
wieselthier, J.E., Nguyen, G.D., Ephremides, A.: Algorithms for Energy-Efficient Multi-casting in Static Ad Hoc Wireless Network. In: Mobile Networks and Applications (MONET), June 2001, 6-3, pp. 251–263 (2001)
Li, F., Xin, X., Hu, Y.: Identity Based Broadcast Signcryption. Computer Standard and Interfaces 30, 89–94 (2008)
Capkum, S., Buttya, L., Hubaux, P.: Self-Organized Public Key Management for Mobile Ad Hoc Networks. IEEE Trans. Mobile Computing 2(1), 52–64 (2003)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic Curve Cryptosystem. Mathematics of Computation 48, 203–209 (1987)
Forouzan, B.A.: Cryptography and Network Security, special Indian edition. Tata McGraw Hill (2007)
Chiang, T.-C., Yeh, C.-H., Huang, Y.M.: A Virtual Subnet Protocol for Mobile Ad Hoc Networks Using Forwarding Cache Scheme. International Journal of Computer Science and Network Security 6(1), 108–115 (2006)
Huang, Y.M., Yeh, C.H., Wang, T.I., Chao, H.C.: Constructing Secure Group Communication over Wireless Ad Hoc Networks based on a Virtual Subnet Model. IEEE Wireless Communications 14(5), 70–75 (2007)
Guillou, L.C., Quisquater, J.-J.: A “Paradoxical” Identity-Based Signature Scheme Resulting from Zero-Knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)
Chang, C.-W., Yeh, C.-H., Tsai, C.-D.: An Efficient Authentication Protocol for Virtual Subnets on Mobile Ad Hoc Networks. In: International Symposium on Computer, Communication, Control and Automation, 3CA2010, pp. 67–70 (2010)
Kavak, N.: Data Communications in ATM Networks. IEEE Network 9(3) (May/June 1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Vilhekar, A.A., Jaidhar, C.D. (2012). Modified Authentication Protocol Using Elliptic Curve Cryptosystem for Virtual Subnets on Mobile Adhoc Networks. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Wireless Communications and Applications. ICWCA 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29157-9_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-29157-9_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29156-2
Online ISBN: 978-3-642-29157-9
eBook Packages: Computer ScienceComputer Science (R0)