SlideShare a Scribd company logo
1 of 16
Securing Mobile Ad Hoc
Networks through Mobility
based Clustering and Threshold
Cryptography
By
A.Prem kumar
What is MANET?
Mobile Ad-Hoc network (MANET) is one
where there is no fixed infrastructure such as
base stations or mobile switching centers.
Why it is for ?
characteristics of Mobile Ad Hoc networks (MANETs)
pose a number of non-trivial challenges to security design.
Stages of the algorithm
1. Discovery Stage
2. Merging Stage
3. Maintaining Stage
INTRODUCTION
1. Cluster formation
2. Each cluster Initiates a merging process
The threshold security technique uses the (n,p)
threshold scheme where some secret data D is
divided into n pieces D1,D2,…..Dn in such a
way that:
1. Knowledge of any p or more Di pieces makes
D easily
computable.
2. Knowledge of any (p-1) or fewer Di pieces
makes D
completely undetermined
1.EACH NODE CALCULATES IT’S
LOCAL STABILITY VALUE.
2.IF IT’S LESS, THAT ASSUMES
STATES OF CLUSTER HEAD
1.Discovery Stage
2.MERGING STAGE
There are two cases that may initiate a
merging process:
1. A non-clustered node requests to join
the neighboring clusters.
2. Two neighboring gateways request to
merge their clusters.
3.MAINTAINING STAGE
We first consider two cases that may cause
topology
changes in MANET and thus invoke cluster
maintenancestage:
1. A node switches on and joins the network.
2. A node switches off and leaves the network
KEY MANAGEMENT SERVICE
1.Efficient secret key schemes are used to
secure further communication after nodes
authenticate each other and establish a shared
secret session key.
2.In a public key infrastructure, each node has
a
public/private key pair. Public keys can be
distributed to other nodes, while private keys
should be kept confidential to individual nodes.
ENCRIPTION &
DECRIPTION
THRESHOLD CRYPTOGRAPHY
An (n, p) threshold cryptography scheme allows
n parties to share the ability to perform a
cryptographic operation (e.g., creating a digital
signature), so that any p parties can perform
this operation jointly, whereas it is infeasible for
at most (p-1) parties to do so, even by
collusion.
Key Management Service K/k
CONCLUSION
1.The idea of using the threshold cryptography
combined with mobility based clustering is
worth examining further to establish its full
potential.
2.To build a highly available and secure key
management service, we propose to use
threshold cryptography to distributed trust
among a set of servers.
Queries..?
THANK YOU

More Related Content

What's hot

key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption KeyIOSR Journals
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShakas Technologies
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...Deepti Dohare
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Sai Vikas Gunti
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Securityijceronline
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 

What's hot (20)

key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Group 6
Group 6Group 6
Group 6
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
 
Lecture12
Lecture12Lecture12
Lecture12
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Nano technology
Nano technologyNano technology
Nano technologyPREMKUMAR
 
Pathways academy powerpoint 2017
Pathways academy powerpoint 2017Pathways academy powerpoint 2017
Pathways academy powerpoint 2017John Sprague
 
Network security
Network securityNetwork security
Network securityPREMKUMAR
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jammingPREMKUMAR
 
Thermal Power Plant
Thermal Power PlantThermal Power Plant
Thermal Power PlantPREMKUMAR
 
Albert einstein
Albert einsteinAlbert einstein
Albert einsteinPREMKUMAR
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...khaledjim
 
World widetelescopetecfest
World widetelescopetecfestWorld widetelescopetecfest
World widetelescopetecfestPREMKUMAR
 
Einstein chrismason
Einstein chrismasonEinstein chrismason
Einstein chrismasonPREMKUMAR
 
4 g communications
4 g communications4 g communications
4 g communicationsPREMKUMAR
 
network security
network securitynetwork security
network securityPREMKUMAR
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Googledriverlesscar
GoogledriverlesscarGoogledriverlesscar
GoogledriverlesscarPREMKUMAR
 

Viewers also liked (20)

Chord waktu yang salah
Chord waktu yang salahChord waktu yang salah
Chord waktu yang salah
 
Nano technology
Nano technologyNano technology
Nano technology
 
Pathways academy powerpoint 2017
Pathways academy powerpoint 2017Pathways academy powerpoint 2017
Pathways academy powerpoint 2017
 
SAP
SAPSAP
SAP
 
Network security
Network securityNetwork security
Network security
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Thermal Power Plant
Thermal Power PlantThermal Power Plant
Thermal Power Plant
 
Albert einstein
Albert einsteinAlbert einstein
Albert einstein
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Alcohol Awareness Month
Alcohol Awareness MonthAlcohol Awareness Month
Alcohol Awareness Month
 
Peace, Love, and Respect
Peace, Love, and RespectPeace, Love, and Respect
Peace, Love, and Respect
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...
 
World widetelescopetecfest
World widetelescopetecfestWorld widetelescopetecfest
World widetelescopetecfest
 
Media Star 2015
Media Star 2015Media Star 2015
Media Star 2015
 
Einstein chrismason
Einstein chrismasonEinstein chrismason
Einstein chrismason
 
4 g communications
4 g communications4 g communications
4 g communications
 
Test proj
Test projTest proj
Test proj
 
network security
network securitynetwork security
network security
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Googledriverlesscar
GoogledriverlesscarGoogledriverlesscar
Googledriverlesscar
 

Similar to Securing MANETs through mobility clustering and threshold crypto

Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYIJNSA Journal
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
Effective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor NetworksEffective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor NetworksvishnuRajan20
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based nodekalaiselvanresearch
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...Venkata Swaroop
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networksijceronline
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 

Similar to Securing MANETs through mobility clustering and threshold crypto (20)

Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Effective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor NetworksEffective Key Management in Dynamic Wireless Sensor Networks
Effective Key Management in Dynamic Wireless Sensor Networks
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based node
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor NetworksRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 

More from PREMKUMAR

Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-votingPREMKUMAR
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkPREMKUMAR
 
3G technology
3G technology3G technology
3G technologyPREMKUMAR
 
Face Morphing
Face MorphingFace Morphing
Face MorphingPREMKUMAR
 
NANO ROBOTICS
NANO ROBOTICSNANO ROBOTICS
NANO ROBOTICSPREMKUMAR
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERYPREMKUMAR
 
Memristor techonolgy
Memristor techonolgyMemristor techonolgy
Memristor techonolgyPREMKUMAR
 
11 brain finger printing
11 brain finger printing11 brain finger printing
11 brain finger printingPREMKUMAR
 
Non conventional energy sources
Non conventional energy sourcesNon conventional energy sources
Non conventional energy sourcesPREMKUMAR
 
Widescreen PowerPoint
 Widescreen PowerPoint Widescreen PowerPoint
Widescreen PowerPointPREMKUMAR
 
Power aware cloud metering
Power aware cloud meteringPower aware cloud metering
Power aware cloud meteringPREMKUMAR
 
Agriculture field monitoring
Agriculture field monitoringAgriculture field monitoring
Agriculture field monitoringPREMKUMAR
 
Canal of design
Canal of designCanal of design
Canal of designPREMKUMAR
 

More from PREMKUMAR (18)

Redtacton
RedtactonRedtacton
Redtacton
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
 
Steganography
SteganographySteganography
Steganography
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Android
AndroidAndroid
Android
 
3G technology
3G technology3G technology
3G technology
 
Robotics
RoboticsRobotics
Robotics
 
Face Morphing
Face MorphingFace Morphing
Face Morphing
 
NANO ROBOTICS
NANO ROBOTICSNANO ROBOTICS
NANO ROBOTICS
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERY
 
Memristor techonolgy
Memristor techonolgyMemristor techonolgy
Memristor techonolgy
 
11 brain finger printing
11 brain finger printing11 brain finger printing
11 brain finger printing
 
Non conventional energy sources
Non conventional energy sourcesNon conventional energy sources
Non conventional energy sources
 
Widescreen PowerPoint
 Widescreen PowerPoint Widescreen PowerPoint
Widescreen PowerPoint
 
4G
4G4G
4G
 
Power aware cloud metering
Power aware cloud meteringPower aware cloud metering
Power aware cloud metering
 
Agriculture field monitoring
Agriculture field monitoringAgriculture field monitoring
Agriculture field monitoring
 
Canal of design
Canal of designCanal of design
Canal of design
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Securing MANETs through mobility clustering and threshold crypto

  • 1. Securing Mobile Ad Hoc Networks through Mobility based Clustering and Threshold Cryptography By A.Prem kumar
  • 2. What is MANET? Mobile Ad-Hoc network (MANET) is one where there is no fixed infrastructure such as base stations or mobile switching centers.
  • 3. Why it is for ? characteristics of Mobile Ad Hoc networks (MANETs) pose a number of non-trivial challenges to security design.
  • 4. Stages of the algorithm 1. Discovery Stage 2. Merging Stage 3. Maintaining Stage
  • 5. INTRODUCTION 1. Cluster formation 2. Each cluster Initiates a merging process The threshold security technique uses the (n,p) threshold scheme where some secret data D is divided into n pieces D1,D2,…..Dn in such a way that: 1. Knowledge of any p or more Di pieces makes D easily computable. 2. Knowledge of any (p-1) or fewer Di pieces makes D completely undetermined
  • 6. 1.EACH NODE CALCULATES IT’S LOCAL STABILITY VALUE. 2.IF IT’S LESS, THAT ASSUMES STATES OF CLUSTER HEAD 1.Discovery Stage
  • 7. 2.MERGING STAGE There are two cases that may initiate a merging process: 1. A non-clustered node requests to join the neighboring clusters. 2. Two neighboring gateways request to merge their clusters.
  • 8. 3.MAINTAINING STAGE We first consider two cases that may cause topology changes in MANET and thus invoke cluster maintenancestage: 1. A node switches on and joins the network. 2. A node switches off and leaves the network
  • 9. KEY MANAGEMENT SERVICE 1.Efficient secret key schemes are used to secure further communication after nodes authenticate each other and establish a shared secret session key. 2.In a public key infrastructure, each node has a public/private key pair. Public keys can be distributed to other nodes, while private keys should be kept confidential to individual nodes.
  • 11.
  • 12. THRESHOLD CRYPTOGRAPHY An (n, p) threshold cryptography scheme allows n parties to share the ability to perform a cryptographic operation (e.g., creating a digital signature), so that any p parties can perform this operation jointly, whereas it is infeasible for at most (p-1) parties to do so, even by collusion.
  • 14. CONCLUSION 1.The idea of using the threshold cryptography combined with mobility based clustering is worth examining further to establish its full potential. 2.To build a highly available and secure key management service, we propose to use threshold cryptography to distributed trust among a set of servers.