International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 11, November 2015


A Cryptographical Approach for security in Mobile Adhoc Networks

R. Prasanna [13] | K. Balaji [3]


Abstract: Adhoc network is very popular due to their infrastructure less architecture. One main challenge in such networks is to provide security in communication where the hosts rely on each other to keep the network connected. This types of network suffers in passive eavesdropping, impersonation, replay attacks. To resist this type of attack we use secret sharing techniques based on CRT. In this paper we have proposed a two level key distribution scheme for adhoc networks. In the first level we use Knapsack algorithm for key distribution among the cluster heads and in the second level we use Chinese remainder theorem (CRT) to share the secret among the nodes of the cluster


Keywords: Authentication, Knapsack-public key cryptography, Asmuth-bloom secret sharing, Chinese remainder theorem CRT


Edition: Volume 4 Issue 11, November 2015,


Pages: 1273 - 1276


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

R. Prasanna, K. Balaji, "A Cryptographical Approach for security in Mobile Adhoc Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1273-1276, https://www.ijsr.net/get_abstract.php?paper_id=NOV151449

Similar Articles with Keyword 'Authentication'

Downloads: 88

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi | Dr. Veena Desai

Share this Article

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade | Dimple Chaudhari [2]

Share this Article
Top