Skip to main content

Modified Authentication Protocol Using Elliptic Curve Cryptosystem for Virtual Subnets on Mobile Adhoc Networks

  • Conference paper
Wireless Communications and Applications (ICWCA 2011)

Abstract

In 2010, an efficient authentication protocol has been proposed for virtual subnets on Mobile Adhoc Networks (MANET). It uses virtual subnet and each node in the subnet is authenticated using certificate. Further, it is claimed that protocol is robust, more efficient and practical. However, it is not suitable for devices have low computation power like mobile, PDAs, smart cards because number of computations are more in RSA based cryptosystem. In order to reduce the number of computation with same level of security, this paper proposes the same scheme using Elliptic Curve Cryptography (ECC) (modified scheme). Our scheme uses ECC in place of RSA to reduce number of computations with shorter key size.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aziz, B., Nourdine, E., Mohamed, E.-K.: A Recent Survey on Key Management Schemes in MANET. In: ICTTA 2008, pp. 1–6 (2008)

    Google Scholar 

  2. Perkins, C.: Ad Hoc Networks. Addison-Wesley, Reading (2001)

    Google Scholar 

  3. Rajaravivarma, V.: Virtual Local area Network Technology and Applications. In: Proceeding of the Twenty-Ninth Southeastern Symposium, March 9-11, pp. 49–52 (1997)

    Google Scholar 

  4. wieselthier, J.E., Nguyen, G.D., Ephremides, A.: Algorithms for Energy-Efficient Multi-casting in Static Ad Hoc Wireless Network. In: Mobile Networks and Applications (MONET), June 2001, 6-3, pp. 251–263 (2001)

    Google Scholar 

  5. Li, F., Xin, X., Hu, Y.: Identity Based Broadcast Signcryption. Computer Standard and Interfaces 30, 89–94 (2008)

    Article  Google Scholar 

  6. Capkum, S., Buttya, L., Hubaux, P.: Self-Organized Public Key Management for Mobile Ad Hoc Networks. IEEE Trans. Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  7. Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  8. Koblitz, N.: Elliptic Curve Cryptosystem. Mathematics of Computation 48, 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  9. Forouzan, B.A.: Cryptography and Network Security, special Indian edition. Tata McGraw Hill (2007)

    Google Scholar 

  10. Chiang, T.-C., Yeh, C.-H., Huang, Y.M.: A Virtual Subnet Protocol for Mobile Ad Hoc Networks Using Forwarding Cache Scheme. International Journal of Computer Science and Network Security 6(1), 108–115 (2006)

    Google Scholar 

  11. Huang, Y.M., Yeh, C.H., Wang, T.I., Chao, H.C.: Constructing Secure Group Communication over Wireless Ad Hoc Networks based on a Virtual Subnet Model. IEEE Wireless Communications 14(5), 70–75 (2007)

    Article  Google Scholar 

  12. Guillou, L.C., Quisquater, J.-J.: A “Paradoxical” Identity-Based Signature Scheme Resulting from Zero-Knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  13. Chang, C.-W., Yeh, C.-H., Tsai, C.-D.: An Efficient Authentication Protocol for Virtual Subnets on Mobile Ad Hoc Networks. In: International Symposium on Computer, Communication, Control and Automation, 3CA2010, pp. 67–70 (2010)

    Google Scholar 

  14. Kavak, N.: Data Communications in ATM Networks. IEEE Network 9(3) (May/June 1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Vilhekar, A.A., Jaidhar, C.D. (2012). Modified Authentication Protocol Using Elliptic Curve Cryptosystem for Virtual Subnets on Mobile Adhoc Networks. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Wireless Communications and Applications. ICWCA 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29157-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29157-9_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29156-2

  • Online ISBN: 978-3-642-29157-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics