Volume 13 , Issue 2 , PP: 127-135, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
D. Neela M. Shyam 1 * , Mohammed Ali Hussain 2
Doi: https://doi.org/10.54216/FPA.130211
Because wireless infrastructure-less networks are dynamic, varied, and scattered, implementing security in them is exceedingly difficult. Authentication is the most crucial prerequisite for security deployment. It is difficult to implement security based on public-key infrastructure with centralized third-party authentication in an environment without infrastructure. We build and test a chaotic map-based technique that handles authentication as one of the key qualities to accomplish security. We allocate the key management responsibility to cluster-heads after dividing the infrastructure-less into several clusters with cluster-heads. The Diffie-Helman property, which is based on Chebyshev polynomials, is used in the proposed work to establish authentication. Our suggested method avoids unnecessary computations like modular exponentiation and elliptical curve scalar multiplications. It also ensures that the secret session-key is only established between the two designated entities and is resistant to a variety of network attacks.
Wireless Infra structure less networks , authenticated key agreement , clusters , Diffie-Helman Property , attacks.
[1] Bang, Ankur O., and Prabhakar L. Ramteke. "MANET: History, challenges and applications." International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2.9 (2013): 249-251.
[2] Raja, L., and S. Santhosh Baboo. "An overview of MANET: Applications, attacks and challenges." International journal of computer science and mobile computing 3.1 (2014): 408-417.
[3] Chitkara, Mahima, and Mohd Waseem Ahmad. "Review on manet: characteristics, challenges, imperatives and routing protocols." International journal of computer science and mobile computing 3.2 (2014): 432-437.
[4] Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.
[5] Yadav, Dega Ravi Kumar, K. Nikitha Reddy, and N. Vamshi Krishna. "Authenticated Mutual Communication between two Nodes in MANETs." International Journal of Computer Science and Information Technologies 4.2 (2013): 331-333.
[6] Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Energy-Aware Reliable Routing by Considering Current Residual Condition of Nodes in MANETs." Soft Computing in Data Analytics. Springer, Singapore, 2019. 441-452.
[7] Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network." International Journal of Hybrid Intelligence 1.2-3 (2019): 239-267.
[8] Mason, John C., and David C. Handscomb. Chebyshev polynomials. Chapman and Hall/CRC, 2002.
[9] Tse, David, and Pramod Viswanath. Fundamentals of wireless communication. Cambridge university press, 2005.
[10] Rafaeli, Sandro, and David Hutchison. "A survey of key management for secure group communication." ACM Computing Surveys (CSUR) 35.3 (2003): 309-329.
[11] He, Xiaobing, Michael Niedermeier, and Hermann De Meer. "Dynamic key management in wireless sensor networks: A survey." Journal of network and computer applications 36.2 (2013): 611-622.
[12] S. Hemamalini ,V. D. Ambeth Kumar ,R. Venkatesan,S. Malathi. "Relevance Mapping based CNN model with OSR-FCA Technique for Multi-label DR Classification." Fusion: Practice and Applications, Vol. 11, No. 2, 2023 ,PP. 90-110
[13] C. S. Manigandaa,V. D. Ambeth Kumar,G. Ragunath,R. Venkatesan,N. Senthil Kumar. “De-Noising and Segmentation of Medical Images using Neutrophilic Sets”, Fusion: Practice and Applications, Vol.11, No. 2, 2023 ,PP. 111-123.
[14] Qusay Abboodi Ali,Noor M. Sahab. “Interactive Design of a Virtual Classroom Simulation Model Based on Multimedia Applications to Improve the Teaching and Learning Process in the Tikrit University Environment” , Fusion: Practice and Applications, Vol. 12, No. 2, 2023 ,PP. 206-216
[15] V. Sathya Preiya,V. D. Ambeth Kumar,R. Vijay,Vijay K.,N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition." Fusion: Practice and Applications, Vol. 12, No. 1, 2023 ,PP. 53-63
[16] Hamza M. Ridha Al-Khafaji ,Refed Adnan Jaleel. "Design of High-Performance Intelligent WSN based-IoT using Time Synchronized Channel Hopping and Spatial Correlation Model." Fusion: Practice and Applications, Vol. 13, No. 1, 2023 ,PP. 49-58
[17] Balakrishnan, C.; Ambeth Kumar, V.D. IoT-Enabled Classification of Echocardiogram Images for Cardiovascular Disease Risk Prediction with Pre-Trained Recurrent Convolutional Neural Networks. Diagnostics 2023, 13, 775. https://doi.org/10.3390/diagnostics13040775
[18] Sathya Preiya, V.; Kumar, V.D.A. Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics 2023, 13, 1983. https://doi.org/10.3390/diagnostics13121983