Neighbordiscovery-based security enhancement using threshold cryptography for IP address assigning in network

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The security threats related to current IP configurationand also includes with Threshold Cryptography (TC). Circulated situations are attractive more prevalent as these knowledge such as networks, aim to enable a large scale collaboration for resource sharing outline in the network. Secure verification is the interesting concern for such surroundings. The proposed system to maintain a two stages for improving the network security based on IP addressing time in the network. An first stage is threshold cryptography and another one is Neighbor discovery protocol (NDP). In main objectives of our proposed work is Threshold Cryptography based addressing scheme in network, also the authorization process fully depends on Neighbor discovery protocol based frameworks. The goal of the Neighbor discovery protocol is to support a Mobile Node (MN) roaming across network fields without communication disturbance or recognizable delay. Moreover, this approach also ensures correct synchronization between nodes that send overlapping data on the network. Finally, using this NDP-TC during data transfer time packet loss is very low so the network security is automatically increased.

  • Keywords

    Threshold Cryptography; Encryption and Decryption; NDP; Security.

  • References

      [1] Dong Q, Liu D & Wright M, “Mitigating jamming attacks in wireless broadcast systems”, Wireless networks, Vol.19, No.8, (2013), pp.1867-1880.

      [2] Rajesh KV, “An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services”, international Journal of Smart Sensors and Ad Hoc Networks, Vol.1, No.4, (2012).

      [3] Yu H, He J, Zhang T, Xiao P & Zhang Y, “Enabling end-to-end secure communication between wireless sensor networks and the Internet”, World Wide Web, Vol.16, No.4, (2013), pp.515-540.

      [4] Cao X, Kou W, Zeng X & Dang L, “Identity-based anonymous remote authentication for value-added services in mobile networks”, IEEE Trans. Veh. Technol., Vol.58, No.7, (2009), pp.3508–3517.

      [5] Christophe B, Boussard M, Lu M, Pastor A &Toubiana V, “The web of things vision: Things as a service and interaction patterns”, Bell labs technical journal, Vol.16, No.1, (2011), pp.55-61.

      [6] Granjal J, Monteiro E & Silva JS, “A Secure interconnection model for IPv6 enabled wireless sensor networks”, Proceeding of the IFIP Wireless Days, (2010), pp.1–6.

      [7] Gupta V, Poursohi A & Udupi P, “Sensor network: an open data exchange for the web of things”, Proceeding of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops, (2010), pp.753–755.

      [8] Mzid R, Boujelben M, Youssef H & Abid M, “Adapting TLS handshake protocol for heterogeneous IP-based WSN using identity based cryptography”, Proceeding of the International Conference on Wireless and Ubiquitous Systems, (2010), pp.1–8.

      [9] Roman R, Alcaraz C, Lopez J &Sklavos N, “Key management systems for sensor networks in the context of the Internet of Things”, Computers & Electrical Engineering, Vol.37, No.2, (2011), pp.147-159.

      [10] Yu H & He J, “Trust-based mutual authentication for bootstrapping in 6LoWPAN”, J. Commun. Technol., Vol.7, No.8, (2012), pp.634–642.

      [11] Ferng HW, Nurhakim J &Horng SJ, “Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network”, Wireless networks, Vol.20, No.4, (2014), pp.625-637.

      [12] Zhao S, “A key management and secure routing integrated framework for Mobile Ad-hoc Networks”, Elsevier, Ad Hoc Networks, Vol.11, No.3, (2013), pp.1046–1061.

      [13] ChuahM & Yang P, “Performance evaluation of content-based information retrieval schemes for DTNs”, Proc. IEEE MILCOM, (2007), pp.1–7.

      [14] Kallahalla M, Riedel E, Swaminathan R, Wang Q & Fu K, “Plutus: Scalable secure file Hasingring on untrusted storage”, Proc. Conf. File Storage Technol., (2003), pp.29–42.

      [15] Ibraimi L, Petkovic M, Nikova S, Hartel P & Jonker W, “Mediated ciphertext-policy attribute-based encryption and its application”, International Workshop on Information Security Applications, (2009),pp.309-323.

      [16] Liu Y, Ning P, Dai H & Liu A, “Randomized differential DSSS: Jamming-resistant wireless broadcast communication”, Proceedings of the 29th IEEE international conference on computer communications, (2010).

      [17] Liu D, Raymer J & Fox A, “Efficient and timely jamming detection in wireless sensor networks”, Proceedings of IEEE international conference on mobile ad hoc and sensor systems (MASS), (2012).

      [18] Zhang Y, Wu C, Cao J & Li X, “A secret sharing-based key management in hierarchical wireless sensor network”, International Journal of Distributed Sensor Networks, Vol.9, No.6, (2013).

      [19] Bertier M, Mostefaoui A &Trédan G, “Low-cost secret-sharing in sensor networks,”Proceedings of the IEEE 12th International Symposium on High Assurance Systems Engineering, (2010), pp. 1–9.

      [20] Claveirole T, Dias De Amorim M, Abdalla M & Viniotis Y, “Securing wireless sensor networks against aggregator compromises”, IEEE Communications Magazine, Vol.46, No.4, (2008), pp.134–141.

      [21] Seyed HN, Amir HJ & Vanesa D, “A distributed group rekeying scheme for wireless sensor networks”, Proc.of the 6th International Conference on Systems and Networks Communications, (2011), pp.127–135.

      [22] Zhang YY, Li XZ, Liu JM, Yang JC & Cui BJ, “A secure hierarchical key management scheme in wireless sensor network,” The International Journal of Distributed Sensor Networks, (2012)

      [23] Zhang YY, Li XZ, Yang JC, Liu YA, Xiong NX &Vasilakos AV, “A real-time dynamic key management for a hierarchical wireless multimedia sensor network”, Multimedia Tools and Applications, (2012).

      [24] Agrawal S, “Verifiable secret sharing in a total of three rounds”, Information Processing Letters, Vol.112, (2012), pp.856–859.

      [25] Hua C, Liao X & Cheng X, “Verifiable multi-secret sharing based on LFSR sequences”, Theoretical Computer Science, Vol.445, (2012), pp.52–62.




Article ID: 9951
DOI: 10.14419/ijet.v7i1.1.9951

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.