Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i39/92897
Year: 2016, Volume: 9, Issue: 39, Pages: 1-6
Original Article
Padmavathi Guddeti1 , P. V. Siva Kumar2* and Appala Naidu Tentu3
1 Department of H&S, VNR VJIET, Hyderabad, India; [email protected]
2 Department of Computer Science and Engineering, VNRVJIET, Hyderabad, India; [email protected]
3 CR Rao AIMSCS, University of Hyderabad Campus , Hyderabad, India; [email protected]
*Author for correspondence
Siva Kumar
Department of Computer Science and Engineering
Email: [email protected]
Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Shamir`s proposal is well known prominent secret sharing schemes. But it does not provide a dynamic approach to the particular application. In the same distribution process nodes may join or leave the network and able to obtain the similar capabilities as initial nodes; further, the joined nodes gain the shares (updated shares) corresponding to the secret. Two additional features of proposed system are that it allows to implement threshold operations, one for distributing secret information with other nodes and the other is using our threshold schemes in key management. Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Proposed the group key establishment protocol operations in detail and also proposed two different methods for dealing network dynamic nature including adding and removing of the nodes..
Keywords: Interpolation, Key Generation, Key Management, MANETs, Threshold, Secret Sharing
Subscribe now for latest articles and news.