2016
DOI: 10.1016/j.pisc.2016.06.057
|View full text |Cite
|
Sign up to set email alerts
|

A novel technique for node authentication in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…With signing the communication of each user and confirming the key, this design provides not only the functionality of detecting malicious insiders but also with involving the trusted arbiter, identifying all the cheaters in the protocol regardless of the number of cheaters in the MANET environment. Aluvala et al (2016) discussed the technique to provide authentication between nodes when a new node joining into the network and before starting route discovery process in MANETs. This technique decreases the impact of attacks on nodes.…”
Section: Review On Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…With signing the communication of each user and confirming the key, this design provides not only the functionality of detecting malicious insiders but also with involving the trusted arbiter, identifying all the cheaters in the protocol regardless of the number of cheaters in the MANET environment. Aluvala et al (2016) discussed the technique to provide authentication between nodes when a new node joining into the network and before starting route discovery process in MANETs. This technique decreases the impact of attacks on nodes.…”
Section: Review On Authenticationmentioning
confidence: 99%
“…New protocols and algorithms, for example, PRISM (Xu et al, 2005) and ALARM (Song et al, 2017) provided privacy with security aware routing. ARAN (Shanthini and Swamynathan, 2011), ID-RSA (Aluvala et al, 2016), DIDRSA (Sumathi and Thanamani, 2011), D2D authentication protocol (Tong et al, 2017) and multimodal biometric-based authentication (Wadbude and Richariya, 2012) attained the fair authentication on while neighbour node discovery. From Table 3 analysis; ARAN is based on both AODV and DSR which is the most commonly used routing protocol for providing both authentication and security.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…A new technique was designed in Srinivas Aluvala et al, 21 for providing the node authentication when new node joins into network of mobile ad-hoc networks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Security is a major concern in MANET. Because of its uncovered connectivity, resource restrictions, without bounded physical guard of the mobile nodes [1]. Thus, MANETs are more inclined to security threats.…”
Section: Introductionmentioning
confidence: 99%