Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery

K. Ramkumar, Mishita Juneja
{"title":"Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery","authors":"K. Ramkumar, Mishita Juneja","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181336","DOIUrl":null,"url":null,"abstract":"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多签名认证和密钥管理系统,确保有效载荷传递的可靠路径
无线网络有很多种类型,未来的网络将是任何类型的Ad Hoc网络来完成中小型任务而无需集中的监控系统。在这种网络中,安全性是主要的挑战,其中的主要元素是机密性和身份验证。未经许可的带宽可以免费用于参与设备之间的数据传输,但现有标准存在许多漏洞,大多数情况下,可靠性取决于任何源和目的之间的中间节点的正确功能。黑客可以随时对流量进行分流,进行中间人攻击,破坏一般网络行为。在Ad hoc网络中,两个节点之间的网络路径不可靠,随时可能崩溃,黑客会利用这一弱点进行各种中间人攻击。到目前为止,还没有标准的方法来发现可能导致安全威胁的两个节点之间路径的任何故意更改。本文提出了一种路径保存技术,在路由发现和路径更新过程中保证中间节点的正确行为,并提出了一种利用多项式插值方法在两个节点之间进行密钥交换的新方法,以保证无线通信的可靠性。密钥是在数据传输过程中交换的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Weather Attribute-Aware Multi-Scale Image Generation with Residual Learning Deep Learning System for Image Retrieval A Novel IoT-based Framework for Indoor Rescue Operations Performance Investigation of Optical Communication System using FSO and OWC Channel Crawler by Inference
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1