ECDSA - Performance improvements of intrusion detection in Mobile Ad-hoc Networks
Keywords:
lliptic curve cryptography, DSA, ECDSAAbstract
A MANET is a temporary either single hop or multi-hop wireless network with collection of mobile nodes without an underlying infrastructure. In this network, the occurrences of misbehavior nodes are a main problem that degrades the network performance. In previous technique watchdog is used to detect nodes misbehaviors in the mobile ad-hoc network, but it contains some of potential issues. To avoid these issues we propose a novel algorithm named as Elliptic Curve Digital Signature Algorithm (ECDSA) particularly designed for increases the security in network.
References
Elhadi M. Shakshuki, Nan Kang and Tarek R. Sheltami ―EAACK—A Secure IntrusionDetection System for MANETs,‖ Transactions
on Industrial Electronics, vol.60, no.3 pp. 1089– 1098, 2013.
B. Sun, ―Intrusion detection in mobile ad hoc networks,‖ Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, ―Mitigating routing misbehavior in mobile adhoc networks,‖ in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp.255–265.
J. Parker, J. Undercoffer, J. Pinkston, and A.Joshi, ―On intrusion detection and response for mobile ad hoc networks,‖ in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp.747–752.
A. Patcha and A. Mishra, ―Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,‖ in Proc. Radio Wireless Conf., 2003, pp. 75–78.
Aqeel Khalique, Kuldip Singh and Sandeep Sood ―Implementation of Elliptic Curve Digital Signature Algorithm,‖ International Journal of Computer Applications, Volume 2 –No.2, pp. 21– 27, May 2010.
Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
R. Rivest, A. Shamir, and L. Adleman, ―A method for obtaining digital signatures and public-key cryptosystems,‖ Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1983.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.