High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Two Tiered Data Origin Authentication Scheme for Adhoc Network

Author(s):

Jyothish K John , Federal Institute of Science and Technology (FISAT) Angamaly, India; Tibin Thomas, Federal Institute of Science and Technology (FISAT) Angamaly, India; Karthik M, Federal Institute of Science and Technology (FISAT) Angamaly, India; Leenu Rebecca Matheew, Federal Institute of Science and Technology (FISAT) Angamaly, India

Keywords:

Digital Signature, Message Authentication Code.

Abstract

Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc.

Other Details

Paper ID: IJSRDV1I9048
Published in: Volume : 1, Issue : 9
Publication Date: 01/12/2013
Page(s): 1881-1886

Article Preview

Download Article