DocumentCode :
1692092
Title :
Genetic Algorithm Based Secure Authentication Protocol with Dual Central Server and Token Authentication in Large Scale Mobile Ad-Hoc Networks
Author :
Panda, Satanik ; Rajappa, Velur ; Biradar, Arun
Author_Institution :
Fac. Dept. of CSE, Cambridge Inst. of Technol., Bangalore
fYear :
2008
Firstpage :
1
Lastpage :
6
Abstract :
The major challenges in mobile ad-hoc network (MANET) are that, it does not have any predefined topology and channel path for communication. In the wireless communication domain the limitation of channel security is enforced by the current technical limitation Wireless communication can not support the orthodox protocol and topology modeling because of continuous change in network ordering and range with variable number of wireless element present in the network. On the other hand we have constraints of the mobile device capabilities in term of memory, processing speed and usage of power. As a result of such limitations we have challenges to provide the channel security or the authorization of access by the available algorithms. Besides the general security objectives like authentication, confidentiality, integrity, availability and non- repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. . In this paper we attempt to analyze threats faced by the ad hoc network environment and provide a classification of the various security mechanisms. We analyzed the respective strengths and vulnerabilities of the existing routing protocols and suggest a comprehensive solution using dual authentication server for the trust management in a ad-hoc network . We propose the ad-hoc routing protocol must start with a node as server and from that onward when ever a new connection is established it should assign a node number generated from the server and maintain a table entry for that. Whenever the second node comes in the network it will be an image server for the main server node for re-authentication any new node comes we will take it for a new entry in the routing table and find a trusted network value for that node. To find the new node value the genetic algorithm is used. And to maintain the natural path we follow ANT based routing protocol.
Keywords :
ad hoc networks; genetic algorithms; mobile computing; network servers; routing protocols; telecommunication security; ANT based routing protocol; channel path; dual authentication server; dual central server; genetic algorithm; mobile ad hoc networks; routing protocol vulnerability; secure authentication protocol; token authentication; Ad hoc networks; Authentication; Genetic algorithms; Large-scale systems; Mobile ad hoc networks; Mobile communication; Network servers; Network topology; Routing protocols; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
Conference_Location :
New Orleans, LO
ISSN :
1930-529X
Print_ISBN :
978-1-4244-2324-8
Type :
conf
DOI :
10.1109/GLOCOM.2008.ECP.1061
Filename :
4698836
Link To Document :
بازگشت