Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 47, Pages: 1-8
Preet Kamal Sharma* and Dinesh Kumar
*Author for correspondence
Preet Kamal Sharma
Department of Computer Application, Guru Kashi University, Talwandi Sabo, Bathinda – 151302, Punjab, India; [email protected]
Objectives: The proposed security model is specifically designed to increase the level of the security by implementing the node integrity verification and data encryption service over the wireless ad-hoc networks. Methods/Statistical Analysis: The proposed security and authentication model has been defined using the 8 bytes to 16 bytes length based variable key length authentication scheme, which is difficult to predict and cryptanalysis attacks, as there is no uniform mechanism to perform the cryptanalysis attack over the authentication data during the exchange or propagation in the wireless ad-hoc networks. Findings: In this paper, we have proposed the public cryptosystem based encryption for light and secure authentication scheme, which utilizes the RSA encryption as the public cryptosystems. The proposed security and authentication model has been deeply analyzed to protect against the variety of attacks using the primary parameter of authentication delay and data loss. This model has been analyzed over the three primary attacks for the resource jamming, which includes the Distributed Denial of Service (DDoS), selective jamming, and black hole attacks for the data dropping and jamming attacks. The proposed authentication and security model for wireless ad-hoc routing has been analyzed for its performance on the basis of the specific performance parameters. The robust and flexible performance of security and authentication based proposed model has been deeply observed from the versatile results obtained from the all paradigms of the simulation. Application/Improvements: The light weight and robust authentication based security mechanism has been proposed for the higher order suitability to serve the specific purpose of security against the attacks over the wireless networks.
Keywords: Ad-Hoc Network Security, Attack Prevention, Cryptanalysis Attacks, Jamming, Light Authentication
Subscribe now for latest articles and news.