{"title":"多签名认证和密钥管理系统,确保有效载荷传递的可靠路径","authors":"K. Ramkumar, Mishita Juneja","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181336","DOIUrl":null,"url":null,"abstract":"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery\",\"authors\":\"K. Ramkumar, Mishita Juneja\",\"doi\":\"10.1109/Indo-TaiwanICAN48429.2020.9181336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.\",\"PeriodicalId\":171125,\"journal\":{\"name\":\"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery
There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.