2007
DOI: 10.3844/jcssp.2007.939.943
|View full text |Cite
|
Sign up to set email alerts
|

Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography

Abstract: Abstract:The secure end-to-end route discovery in the decentralized Mobile Adhoc Networks (MANETs) should have to meet the requirements of prevention of DoS attacks on data traffic, should be adaptive and fault tolerant and must have high speed, low energy overhead and scalability for future development. In this research a secure routing using antnet mechanism and mutual authentication using Elliptic Curve Cryptography (ECC) has been proposed to meet the above requirements. The common perception of public key … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…These algorithms are used in our bit-serial hardware architecture to calculate scalar multiplication. Double-and-add algorithm is chosen as it is dictated in ANSI (Greenlee, 1999) for scalar multiplication (Vijayalakshmi and Palanivelu, 2007). The double-and-add algorithm is a fundamental technique in calculating scalar multiplication.…”
Section: Msb (Double-and-add)mentioning
confidence: 99%
“…These algorithms are used in our bit-serial hardware architecture to calculate scalar multiplication. Double-and-add algorithm is chosen as it is dictated in ANSI (Greenlee, 1999) for scalar multiplication (Vijayalakshmi and Palanivelu, 2007). The double-and-add algorithm is a fundamental technique in calculating scalar multiplication.…”
Section: Msb (Double-and-add)mentioning
confidence: 99%
“…Against this popular belief, ECC is being implemented as a PKC scheme for a resource constrained systems like MANETs. Using the Antnet routing algorithm, the mutual authentication between source and destination is done by master key exchange using ECC in [19]. Ertaul et al [20] implement ECC based Threshold Cryptography (ECC-TC), and explore three efficient ECC encryption algorithms, putting forth the possibility of using these algorithms in different scenarios in a MANET.…”
Section: Wireless Networkmentioning
confidence: 99%
“…SAR-ECC V. Vijayalakshmi and T.G. Palanivelu [87] have proposed a secure ant based routing algorithm for cluster based ad hoc networks using Elliptic Curve Cryptography (ECC) [88], which is abbreviated as SAR-ECC from here on. This approach makes use of two basic processes: one is estimating the trust value between neighbor nodes.…”
Section: Security Aware Aco-based Routing Protocolsmentioning
confidence: 99%
“…There are different ways to set up trust models. S. Sethi and S. K. Udgata [96] have applied the fuzzy logic to estimate the trust values in their protocol FTAR, while the other researchers [87], [89], [100] have applied authentication mechanisms to create their own trust models. From the observations, it shows that the combination of fuzzy logic and ACO could be well suited to improving the security in MANETs.…”
Section: Security Aware Aco-based Routing Protocolsmentioning
confidence: 99%
See 1 more Smart Citation