Abstract

In the modern era the growth of various computing devices such as laptops, PDA’S(Personal Digital Assistant) has imposed a drastic change in computing world which results in the emerging concepts of ubiquitous computing. In ubiquitous computing the various users at the same time can utilize electronic platforms by which they can assess the important information individually .The characteristics of MANET have attracted many researchers too. MANET is a mobile nodes collection which has the capability that it is organized by themselves and also have network topology which is dynamic. The nodes in MANET can communicate directly with nodes in its range and uses intermediate nodes to communicate with nodes which are beyond its radio range .All the nodes that participate in communication form it a wireless network & hence called as MANET. MANET is a emerging self organized wireless network technology which works in opposition to wired infrastructure. MANET faces many challenges to be met. Although many security mechanisms exist in MANET, still many vulnerable attacks harm the system. This paper defines an approach and also defines the aim of the paper that is to find out the techniques for authentication which is more energy efficient and reduce the time in the network for transmission. MANETs are those topology which is dynamic and due to this the network is suffered from various kinds of possible attacks and their infrastructure of MANETs is not predefined. Here, the sensor network are operated by battery and this defines a major concern. The ID based authentication methods consumes network bandwidth more and also increase the time of computation and transmission in the network. So, for better operation, the major factor of concern must be authentication. This paper defines a authentication methods in adhoc sensor network that is based on certificate based security services. In this, we use X.509 certificate format. Here, we do some modification in the certificate format that is reduced the transmission time and consumption of energy in the network. The certificate is deployed on all nodes before starting the communication. The hashing algorithm SHA-1 is used to calculate the hash of these certificates. The Certification Authority (CA) issued the X.509 Certificate and is encrypted using private key of CA. The algorithm used for encryption of hash codes in RSA which uses public and private keys of CA. If two nodes wish to communicate then decryption is done .The decryption is done using public key of CA. The hash code recovered after applying decryption algorithm is subjected to get compared by calculating new hash .If both the hashes are equal then that node is said to be authentic and communication can occur .The performance comparison of original X.509 Certificate with proposed certificate is done in terms of its size, computation energy, energy consumption on transmission /reception and transmission time .The proposed certificate yields much better performance in comparison to original X.509 certificate.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.