preview

Key Security Position And Security

Decent Essays
Key establishment [24] deals with establishing a shared secret key between two or more parties. One can easily achieve the security services like confidentiality or data integrity. Methods for key establishment can be classified into two types namely, key transport protocols and key agreement protocols. A key protocol is a technique in which only one party creates or obtains secret value, and securely transfers it to others. In key agreement protocol two or more parties derive the shared secret where all parties contribute to the secret. Ideally, no single party can control what the final joint value will be. Our key establishment protocol uses the key agreement protocol based on verifiable secret sharing scheme and bilinear pairings.…show more content…
MANETs are a kind of wireless ad hoc network (WANET) that usually has a routable networking environment on top of a Link Layer ad hoc network. Advantage in MANETs is consisting of a peer-to-peer, self-forming, self-healing network. Key agreement protocols are one of the fundamental primitives of cryptography, and allow users to establish session keys securely in the presence of an active adversary. For this we use verifiable secret sharing (VSS) and bilinear concepts in our project. In cryptography, a secret sharing scheme is verifiable when the nodes are allowed to verify their shares as consistent. A VSS has three phases: a Distribution phase, Verification phase and Reconstruction phase. We implement the verification property of VSS in verifying shares. This property is additionally ensured with the help of commitments in secret sharing schemes like Shamir‘s secret sharing. We proceed by having knowledge on adhoc on demand routing protocol (AODV), Destination Sequence distance vector (DSDV) protocols and using them in ns-2. In this project nodes verify shares through commitments when the source sends shares of secret key to destination on multiple ways and the destination reconstructs it by collecting all individual shares. After keys sharing, the encrypted packets are send from source to destination at a specified time during runtime.
In our project we implement two party key agreement for MANET environment without
Get Access