Open Access Open Access  Restricted Access Subscription Access

Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network


Affiliations
1 Department of Computer Science, Madina Engineering College, India
 

A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.

Keywords

Adhoc Network, Key Stream, MANET, Quality of Service, Self Secure.
User
Notifications
Font Size

Abstract Views: 147

PDF Views: 0




  • Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

Abstract Views: 147  |  PDF Views: 0

Authors

T. Surya Prakash Reddy
Department of Computer Science, Madina Engineering College, India
T. Sunil Kumar Reddy
Department of Computer Science, Madina Engineering College, India

Abstract


A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.

Keywords


Adhoc Network, Key Stream, MANET, Quality of Service, Self Secure.