A novel node authentication protocol connected with ECC for heterogeneous network
- PDF / 397,158 Bytes
- 14 Pages / 595.276 x 790.866 pts Page_size
- 119 Downloads / 169 Views
(0123456789().,-volV)(0123456789(). ,- volV)
A novel node authentication protocol connected with ECC for heterogeneous network Purushottam G. Chilveri1 • Manoj S. Nagmode2
Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Unlike regular wireless networks like Mobile Ad hoc NETworks (MANET) can be exploited instinctively devoid of necessitating any centralized administration or available network infrastructure. In such networks, the mobile nodes perform as relays to assist multi-hop communications and, in most cases, they are accountable for the entire networking functions. MANET is a very challenging task owing to the actuality that these systems may be subjected to attacks causing the network malicious. Among single- server and multi-server authentications, this paper intends to focus on multi-server authentication process in MANET or WSN or any heterogeneous network, which includes a secure protocol that provides a proper communication link between the nodes. In a single server network, both the credentials and authenticating procedure are handled by a single server. On the other hand, in a multi-server network, the credentials and authenticating procedure are handled by separate servers, and hence practically it is more robust against attacks. Hence, this paper develops a security protocol using Elliptic Curve Cryptography (ECC) in prime field. By adopting hash function, a secure way for key exchange is provided. Before transmitting the message from one node to another, it has to be ensured whether it is an authorized node or not. For authorizing purpose, a novel authenticating algorithm is developed based on two servers, a master server and normal server. Accordingly, the credentials and the processing steps are separated in such a way that compromising one of the servers never pose any threat to the whole authentication system. Initially, a node should register its credentials to the register centre, and those credentials are distributed to the server by a secure distribution algorithm where no hacking could be possible. The implemented technique is analyzed in terms of cost and security, and the results are obtained. Keywords Mobile Ad hoc NETworks Elliptic Curve Cryptography Attacks Authentication protocol
1 Introduction MANET is a universal applicant in day to day life in recent years. The mobile devices are said to be the nodes in MANET [1], the packets or data flows through the network with the assistant of host and sink nodes [2]. Wireless communication does not have physical cables; it permit
& Manoj S. Nagmode [email protected] Purushottam G. Chilveri [email protected] 1
Zeal College of Engineering and Research, Savitribai Phule Pune University, Pune, India
2
Government College of Engineering Avasari, Pune, India
host and/or router nodes to move with a certain freedom in the wireless network. This is one of the advantages of a wireless network [3]. The MANET has various characteristics: mobility, resource constraint, infrastructure less dynamic topolo
Data Loading...