Securing Mobile Ad Hoc Networks with Certificateless Public Keys
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Aug 2010
29-08-2010, 11:32 PM

i Mr.Venkata krishnareddy doing project and implimentation on Securing Mobile Ad Hoc Networks with Certificateless Public Keys.i don't any thing regarding this so please send me the details of this project and implimentation.and whether we can do the project and implimentation by using .net tools or not.please help me in doing this project and implimentation sir...........
thanking u sir....
Active In SP

Posts: 1,124
Joined: Jun 2010
07-10-2010, 01:17 PM

Roberto Di Pietro
This article is presented by:
Dipartimento di Matematica
Universitµa di Roma Tre
Rome, Italy
Luigi Vincenzo Mancini
Dipartimento di Informatica
Universitµa di Roma \La Sapienza"
Rome, Italy

Giorgio Zanin
Dipartimento di Informatica
Universitµa di Roma \La Sapienza"
Rome, Italy

Efficient and Adaptive Threshold Signaturesfor Ad hoc networks

In this paper, we propose a secure, °exible, robust and fully distributed signature service, for ad hoc groups. In order to provide the service, we use a new threshold scheme, that allows to share a secret key among the current group members. The novelty of the scheme is in that it easily and e±ciently enables dynamic increase of the threshold, according to the needs of the group, so that the service provides both adaptiveness to the level of threat the ad hoc group is subject to, and availability. We prove the correctness of the protocol and evaluate its e±ciency. The changes to the threshold are performed by using a protocol that is e±cient in terms of in- teractions among nodes and per-node required resources, resulting suitable even for resource-constrained settings. Finally, the same proposed scheme allows to detect nodes that attempt to disrupt the service, providing invalid contributions to the distributed signature service.

Introduction and Background
Mobile Ad Hoc Networks (MANETs) are inherently self-organized, large-scale and fault-tolerant networks, made of miniature wireless devices such as PDAs, cellular phones, Pocket PCs. They generally exhibit dynamic membership and topology, i.e. nodes can join and leave the network, as well as fail, over time. In particular, their size may change drastically in a short time period. MANETs, as in common ad hoc groups, can be characterized by a not-hierarchical struc- ture, such that their nodes are autonomous peers. Due to their ability to provide a wide range of services, their use can be appealing for both military and civilian applications. Further, they are expected to be employed for pro- viding pervasive services, playing a crucial role in any aspect of everyday life, impacting the way people work, and interact with each other, and the way business, education, entertainment, and health-care are operating, depicting the vision of anytime ubiquitous computing. However, MANETs introduce new security challenges, compared to tradi- tional wired or cellular wireless networks, due to: dynamic topology, produced by mobility and change in the number and distribution of active nodes in the network; severe resource constraints, that call for power-e±cient protocols; absence of a trusted infrastructure; necessity for group oriented distributed services and protocols. These challenges have stimulated considerable re- search interest in recent years, because ad hoc networks cannot be adopted widespread, without adequate security. In particular, features such as decen- tralized operation and dynamic membership, bring a bulk of challenges from the perspective of security, such as member authentication, access control, secure group communication, and secure routing to cite a few. In this paper, we present a distributed signature scheme for ad hoc net- works, that improves over current solutions. Basically, a signature Sig(m) of a message m is an encryption of m using a secret key sk, that is Sig(m) = [m]sk. In practice, any signature scheme is generally applied to hashed values of mes- sages, rather than to the messages themselves; the hashed values are computed by using a strong hash function, such as SHA-1. Here, for ease of presentation, we assume that m is an already such hashed value. The signature needs to be veri¯able by using a public key pk, that is, for any valid signature Sig(m), it is required that [Sig(m)]pk = m holds. In order to distribute a signature service, two tools are necessary: one for generating the <sk; pk> pair, and one for distributing, among a set of distinct individuals, the ability to sign messages under sk. In the following, we assume the MANET to have associated an RSA key pair <sk; pk>. Current solutions, for distributing the signing ability to a group of individuals, are based on standard threshold schemes, in which sk is divided into a given number of shares that are distributed to as many cosigners.

For more information about this article,please follow the link:


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy-Preserving Public Auditing for Secure Cloud Storage Guest 7 1,826 19-07-2014, 03:54 PM
Last Post: mkaasees
  coin based mobile charger using solar panel Guest 1 1,349 26-10-2013, 08:05 PM
Last Post: Guest
  wireless charging of mobile phone using microwaves dsouza 75 31,853 18-09-2013, 02:43 PM
Last Post: Guest
  Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks surya prakash 5 2,131 12-09-2013, 09:59 AM
Last Post: seminar projects maker
Last Post: study tips
  mobile communication swathi cute 1 404 27-08-2013, 10:00 AM
Last Post: study tips
  project and implimentation on neural networks and fuzzzy logic simrat chawla 1 351 22-08-2013, 09:34 AM
Last Post: study tips
Rainbow Bluetooth based smart sensor networks Guest 2 625 20-08-2013, 02:41 PM
Last Post: study tips
  thermal analysis of mobile phone Guest 0 320 18-08-2013, 01:18 PM
Last Post: Guest
  A Framework for Personal Mobile Commerce Pattern Mining and Prediction AMITI 5 1,316 09-08-2013, 09:29 AM
Last Post: study tips