Indian Journal of Science and Technology
DOI: 10.17485/ijst/2018/v11i46/132530
Year: 2018, Volume: 11, Issue: 46, Pages: 1-8
Original Article
T. Senthil Kumar* and S. Prabakaran
SRM Institute of Science and Technology, Kattankulathur – 603203, Tamil Nadu, India; [email protected], [email protected]
*Author for correspondence
T. Senthil Kumar,
SRM Institute of Science and Technology, Kattankulathur – 603203, Tamil Nadu, India; [email protected]
Objectives: To delineate various security vulnerabilities and defence strategies involved in secure mobile communications. Methods/Statistical Analysis: Due to the enormous growth of mobile communication, there is also a fear on providing security and privacy preserving for users over the network. In this paper, the methodologies contributed for solving the security constraints of WMN have been discussed. Mainly, models based on Mutual Authentication, Authenticated Key Agreement (AKA), Elliptic Curve Cryptography based security employment and bilinear pairing techniques have been analyzed and described. Mention the methodology used; data base consulted, criteria for omission or inclusion; keywords used for data collection, period covered etc. Findings: The contribution involves in clear examination of methodologies satisfying major security requirements such as Authentication, Confidentiality, Availability and Integrity. Moreover, distinctive security constraints have been analyzed and mitigation techniques have been discussed for those security issues effectively. From the survey work, it is found that Mutual Authentication and Key agreement based Cryptographic conceits perform effectively in solving the security issues on WMN. Applications/Improvements: Further, this extensive analysis aims to elaborate the numerous unresolved issues and effective.
Keywords: AKA, Bilinear Pairings, ECC, Mutual Authentication, WMN
Subscribe now for latest articles and news.