Path Oriented N-Generated Keys Exchanged Through Secondary Path to Achieve MANET’s Security

Authors

  • Chandrakant Naikodi Visiting Professor,CiTech, Bangalore, Karnataka, India

Keywords:

MOBILE AD-HOC NETWORK, IKn2, Alternative Path, Intermediate Key

Abstract

The correspondence of a MOBILE ADHOC NETWORK takes a shot at one key or N-key called
KEY1 and KEY2 or IKN 2 to build up correspondence
between hubs. Here source hub will produce and stores
KEY2 and goal hub will create and stores KEY1. At the
point when source hub starts correspondence for goal,
source hub will send a demand parcel to goal by means of
most brief/lesscost path (PATH1). Here PATH1 can have
numerous hubs and every hub will create a mystery key at
whatever point it gets a bundle for first time for a specific
session. Since parcel should take this key and push forward
to next hub, correspondingly, next hub too creates a
mystery key and annexes to this bundle, this assignment
will be proceeded until the point when parcel achieves its
goal, these all middle of the INTERMEDIATE KEYs (IK)
are blended (like applying number juggling or consistent
operation) to frame an exceptional key in the goal called
as IKn2 where n>2 i.e barring source hub and goal hub.
Both side interchanges ought to have particular hub's keys.
i.e. source bundle ought to have KEY1,IKn2 (contingent on
single key or N-Key) and goal parcel ought to have
KEY2,IKn2. KEY1, KEY2 and IKn2 will lapse after every
session closes

Published

2017-10-25

How to Cite

Path Oriented N-Generated Keys Exchanged Through Secondary Path to Achieve MANET’s Security. (2017). International Journal of Advance Engineering and Research Development (IJAERD), 4(10), 9-13. https://www.ijaerd.org/index.php/IJAERD/article/view/3734

Similar Articles

1-10 of 3153

You may also start an advanced similarity search for this article.