A Two Tiered Data Origin Authentication Scheme for Adhoc Network |
Author(s): |
Jyothish K John , Federal Institute of Science and Technology (FISAT) Angamaly, India; Tibin Thomas, Federal Institute of Science and Technology (FISAT) Angamaly, India; Karthik M, Federal Institute of Science and Technology (FISAT) Angamaly, India; Leenu Rebecca Matheew, Federal Institute of Science and Technology (FISAT) Angamaly, India |
Keywords: |
Digital Signature, Message Authentication Code. |
Abstract |
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc. |
Other Details |
Paper ID: IJSRDV1I9048 Published in: Volume : 1, Issue : 9 Publication Date: 01/12/2013 Page(s): 1881-1886 |
Article Preview |
|
|