Title :
Threshold Cryptography & Genetic Algorithm Based Secure Key Exchange for Mobile Hosts
Author :
Sahoo, D. ; Rai, S. Champati ; Pradhan, S.
Author_Institution :
Dept. of Inf. Technol., Eastern Acad. of Sci.&Technol. (EAST), Bhubaneswar
Abstract :
The unpredictable movement of mobile nodes consequences dynamic change of topology as well as breaking and reestablishment of links among of the network nodes. The failure of links, not only change the network size but creates an environment for the intruders to become members of the network, which is a major security concern. Detection of such unwanted entity requires secure key exchange mechanism with the certificate authority (CA) node. In this paper, we propose an end-to-end security mechanism by employing CA functionality at servers for providing digital certificates to certain selected client nodes using Threshold Cryptography and Diffie Hellman Key exchange method. The server nodes provide the CA functionality to the client node that wants to access the network. To provide a robust security system for the network, we employ genetic algorithm (GA) in our model, as an optimal verification tool. The simulation result of the model shows that the verification of any entity requires very less time. However, no entity can obtain the key of CA with known equipment-id within a time limit.
Keywords :
genetic algorithms; mobile radio; public key cryptography; telecommunication network topology; telecommunication security; Diffie Hellman key exchange method; certificate authority node; client node; digital certificate; dynamic topology change; end-to-end security mechanism; genetic algorithm; mobile host; mobile node movement; network access; network intruders; network node; secure key exchange; security system; server node; threshold cryptography; unwanted entity detection; Communication system security; Computer networks; Computer science; Fault tolerance; Genetic algorithms; Mobile computing; Network servers; Network topology; Protocols; Public key cryptography; Certificate Authority; Discrete Logarithm; GA; Mobile Hosts; Threshold Cryptography;
Conference_Titel :
Advance Computing Conference, 2009. IACC 2009. IEEE International
Conference_Location :
Patiala
Print_ISBN :
978-1-4244-2927-1
Electronic_ISBN :
978-1-4244-2928-8
DOI :
10.1109/IADCC.2009.4809203