Mobile ad hoc network (MANET) is a self configuring and self relating wireless network of mobile nodes connected devoid of wires. Due to their unique characteristics such as mobility, dynamic topology and lack of essential infrastructure support, security is more challenging in MANET. So, to enhance the security in MANET, we propose Enhanced Identity-Based Cryptography (EIBC), an efficient key management mechanism uses cryptography concept for encryption and decryption of data packets beside with routing information. EIBC system has secret values which perform similar to the original model secret value. In EIBC, the node calculates the live public key and live private key for verification purpose. Enhanced ID-Base Signature is also used for authentication rationale using signature. After completing verification purpose, the protected channel sends the data packets using Enhanced ID-Based Encryption. In Enhanced ID-Based Encryption, the node sends the packet in an encrypted mode using live public key and the node receives the packet in a decrypted mode using live private key. EIBC achieves a elevated level of security while handling system key refreshment process in an efficient manner. The brute force attack is averted by constructing EIBC. The performance is analyzed when there is security mechanism and when there is no security mechanism. Keywords— Enhanced ID-Based Encryption, Enhanced ID-Base Signature,MANET, key refreshment,brute-force attack.
[1]
Haiyun Luo,et al.
Security in mobile ad hoc networks: challenges and solutions
,
2004,
IEEE Wireless Communications.
[2]
S. S. Tyagi.
Study of MANET: Characteristics, Challenges, Application and Security Attacks
,
2013
.
[3]
P. Goyal,et al.
MANET: Vulnerabilities, Challenges, Attacks, Application
,
2011
.
[4]
Craig Gentry,et al.
Hierarchical ID-Based Cryptography
,
2002,
ASIACRYPT.
[5]
V. C. M. Leung,et al.
EIBC: Enhanced Identity-Based Cryptography, a conceptual design
,
2012,
2012 IEEE International Systems Conference SysCon 2012.
[7]
Dr. Anil Kapil.
Identity-Based Key Management in MANETs using Public Key Cryptography
,
2004
.
[9]
M. Kahate,et al.
Improving authentication mechanism for using extended public key cryptography in mobile adhoc network
,
2013
.
[10]
Paz Morillo,et al.
Cryptographic techniques for mobile ad-hoc networks
,
2007,
Comput. Networks.
[11]
Azizah Abdul Manaf,et al.
Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography
,
2014
.
[12]
Richard A. Frost,et al.
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
,
2012,
IEEE Communications Surveys & Tutorials.