Quantitative Evaluation of Authentication among the Nodes and Security in MANET Using Cryptography Algorithms

  • R. K. Gupta, Shafeeq Ahmad, Masood Ahmad

Abstract

            MANETs are of dynamic topology, by its dynamic topology nature MANET has prone to different types of vulnerabilities. ID-based Authentication process increases the computation, transmission time and consumes more bandwidth of the network. Authentication is the main factor of concern for network best performance. In this paper, the authors proposed certificate-based authentication in the sensor network. Authors used here X.509 certificate for authentication. In the certificate make little bit changed; this changed minimized the energy decays on the network and transmission time. Before the communication certificate is generated on all the nodes. The hash (SHA-1) opted for calculating the hash function of the certificates generated by nodes. In the encryption Certification Authority (CA) plays an important role encrypted by the private key of CA and issuing the certificate. Public and private keys issued by CA opt to encryption for the hash values in RSA. Decryption process happed when nodes want to share data with the other nodes, by CA public key.

In the results, the hash code regenerated by applying the decryption algorithm and correlated with the new hash code. In the authentication process verifying the hash code generated in the decryption process, communication established between the nodes when the generated hash code is the same as the encrypted hash code. In this study proposed certificate performance calculated in 10 to 100 nodes and 100*100m ranges of area. And we observed that the transmission time of the proposed certificate is 30Second is better than an original certificate and the energy consumption is low.

Published
2020-06-06
How to Cite
R. K. Gupta, Shafeeq Ahmad, Masood Ahmad. (2020). Quantitative Evaluation of Authentication among the Nodes and Security in MANET Using Cryptography Algorithms . International Journal of Advanced Science and Technology, 29(04), 8688 -. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/30612