多签名认证和密钥管理系统,确保有效载荷传递的可靠路径

K. Ramkumar, Mishita Juneja
{"title":"多签名认证和密钥管理系统,确保有效载荷传递的可靠路径","authors":"K. Ramkumar, Mishita Juneja","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181336","DOIUrl":null,"url":null,"abstract":"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery\",\"authors\":\"K. Ramkumar, Mishita Juneja\",\"doi\":\"10.1109/Indo-TaiwanICAN48429.2020.9181336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.\",\"PeriodicalId\":171125,\"journal\":{\"name\":\"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

无线网络有很多种类型,未来的网络将是任何类型的Ad Hoc网络来完成中小型任务而无需集中的监控系统。在这种网络中,安全性是主要的挑战,其中的主要元素是机密性和身份验证。未经许可的带宽可以免费用于参与设备之间的数据传输,但现有标准存在许多漏洞,大多数情况下,可靠性取决于任何源和目的之间的中间节点的正确功能。黑客可以随时对流量进行分流,进行中间人攻击,破坏一般网络行为。在Ad hoc网络中,两个节点之间的网络路径不可靠,随时可能崩溃,黑客会利用这一弱点进行各种中间人攻击。到目前为止,还没有标准的方法来发现可能导致安全威胁的两个节点之间路径的任何故意更改。本文提出了一种路径保存技术,在路由发现和路径更新过程中保证中间节点的正确行为,并提出了一种利用多项式插值方法在两个节点之间进行密钥交换的新方法,以保证无线通信的可靠性。密钥是在数据传输过程中交换的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Multi Signature Authentication and Key Management System to Ensure Reliable Paths for Payload Delivery
There are many types of wireless networks, the future of networks will be any type of Ad Hoc networks to accomplish small and medium-sized tasks with no centralized monitoring or control systems. The security is the main challenge in such networks, in which, the main elements are confidentiality and authentication. Unlicensed bandwidths are used at free of cost to transfer data amongst the participating devices, but there are many loopholes in existing standards, most of the times, the reliability depends on the correct functioning of intermediate nodes between any source and destination. The hacker can sub divert the traffic at any point of time to make Men in Middle attacks for disrupting general network behavior. The network path between two nodes are unreliable and may collapse at any point of time in Ad hoc Networks, the hackers will try this weak point to perform various Men in Middle attacks. As of now there are no standard methods to find any intentional change of a path between two nodes that may lead to security threats. This paper proposes a method of path preservation technique for ensuring the right behavior of intermediate nodes during route discovery and path updating with a novel method of key exchange between two nodes using polynomial interpolations to ensure reliability of wireless communications. The keys are getting exchanged during data transmission.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信