International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 3, Issue - 9, March 2013
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network

Neha Gupta, Manish Shrivastava

Abstract

Security is a major concern in mobile ad hoc network due to its various characteristics like infrastructure less nature, self configuring etc. Threshold cryptography used in key distribution of mobile ad hoc network enhances security by distributing each part of the divided secret key to each node. It is an effective technique as it refreshes the shares of each share holder periodically. It maintains the security by interchanging the shares among its share holders to prevent unauthorized access. In this paper we are using Threshold cryptography concept on ad hoc on demand distance vector routing protocol to increase the security of mobile ad hoc network. In this paper I propose a secured approach which I call secure ad hoc on demand distance vector and showing the behaviour of throughput, packet delivery ratio, average end to end delay and routing overhead of AODV and SAODV.

Keyword

Mobile Ad hoc network, Ad hoc on demand distance vector, secure ad hoc on demand distance vector, certificate Revocation list.

Cite this article

Refference