PKC For Wireless Mesh Network Using ECC Algorithm
LITERATURE Review:
A critical requirement for security in WMN is the
authentication of a new user who is trying to join the
network. This paper, they present a new authentication
scheme based on a combination of techniques, such as
zone-based hierarchical topology structure, virtual
certification authority (CA), off-line CA, identity-based
cryptosystem and multi-signature.
For maintaining security in network along with proper
authentication PKC is the most useful and reliable method
got invented. PKC can be done with many cryptographic
algorithms where key storage is constraint, but Elliptic
Curve Cryptography can removed this barrier as the RSA
algorithm requires that the key length be at least 1024 bits
for long term security which is not compatible with the
Devices having less Storage & Bandwidth. Instead, ECC is
more and more considered as an attractive public-key
cryptosystem for mobile/wireless environments where ECC
is especially useful for mobile devices, which are typically
limited in terms of their CPU, power, and network
connectivity however, it seems that 160 bits are sufficient
for elliptic curve cryptographic functions.
In 1976, Whitefield Diffie & Martin E. Hellman
introduces new Approach for mutual Authentication and for
security purpose of Cryptography. Due to PKC i.e Public
Key Cryptography two users who wish to communicate can
it is must that they both should have a common key at both
the ends.
Taher Elgamal, introduces PKC based on Discrete
Algorithms in 1985, He stated a public key cryptosystem
and a signature scheme based on the difficulty of
computing discrete logarithms over finite fields. The
systems are only described in GF(p). introduces a new
digital signature scheme that depends on the difficulty of
computing discrete logarithms over finite fields. It is not yet
proved that breaking the system is equivalent to computing
discrete logarithms.
In 1998, M. Aydos, B. Sunar, and C . K. Koc proposed
an authentication and key agreement protocol for wireless
communication based on elliptic curve cryptographic
techniques. With The use of elliptic curve cryptographic
techniques provide greater security using fewer bits,
resulting in a protocol which requires low computational
overhead, and thus, making it suitable for wireless and
mobile communication systems, including smartcards and
handheld devices. After defining ECC in their
paper they proposed extended work of ECC as Elliptic
Curve Digital Signature Algorithm.
Kaleemullah Khan, and Muhammmad Akbar in 2006,
introduces New methodology for secure authentication
technique, with light over-heads that can be conveniently
implemented for the ad-hoc nodes forming clients of an
integrated WMN, thus facilitating their inter-operability.
The proposed authentication scheme is based on using
EAP-TTLS (Tunnelled Transport Layer Security) over
PANA. EAP-TTLS provides flexibility in using any of the
authentication protocols i.e. Password Authentication
Protocol (PAP), Challenge Handshake authentication
Protocol (CHAP), or Message Digest 5 (MD5) etc. The
EAP-TTLS extends EAP-TLS to exchange additional
information between client and server by using secure
tunnel established by TLS negotiation.
In 2009, Ranbir Soram, introduces a New Secure
communication model specially for Cellular
Communication. He investigated the security loopholes in
SMS banking and propose a system to make mobile SMS
banking secure using Elliptic Curve Cryptosystem(ECC).
His ECC module receives the text messages from the
clients/banks and processes them and sends the output back
to the banks/users as and when required. This ECC Banking
module provides secure data encryption and decryption
using public key cryptography .The technology is perfectly
secure and GPRS is not mandatory. He introduces ECC
Using the real numbers for cryptography have a lot of
problem as it is very difficult to store them precisely in
computer memory and predict how much storage will be
needed for them. The difficulty can be solved by using
Galois fields. In a Galois field, the number of elements is
finite. Since the number of elements if finite, we can find a
unique representation for each of them, which allows us to
store and handle the elements in an efficient way. Galois
showed that the number of elements in a Galois field is
always a positive prime power, pn and is denoted by
GF(pn). Two special Galois fields are standard for use in
Elliptic Curve cryptography. They are GF(p) when n=1 and
GF(2n) when p=2.
R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra
Devi, and M. Suguna in 2009, introduces ECC Algorithm
using Knapsack Algorithm. They presented the
implementation of ECC by first transforming the message
into an affine point on the EC, and then applying the
knapsack algorithm on ECC encrypted message over the
finite field GF(p). In ECC we normally start with an affine
point called Pm(x,y). This point lies on the elliptic curve. In
this paper we have illustrated encryption/decryption
involving the ASCII value of the characters constituting the
message, and then subjecting it to the knapsack algorithm.
They compared their algorithm with RSA algorithm and
show that our algorithm is better due to the high degree of
sophistication and complexity involved. It is almost
infeasible to attempt a brute force attack.
In year 2012, Peng Xiao, Jingsha H2 and Yingfang Fu
proposed effective distributed key management scheme for
the establishment of a secure WMN in this paper, which is
based on several technologies, such as ad hoc network
model, ECC, (t, n) threshold cryptographic, verifiable secret
sharing. He introduces the method that all mesh nodes need
to acquire a legal certificate from the offline CA, which is
supported by an ISP or network carrier. And as there is
no CA or administrator center online in the backbone mesh
networks, n mesh routers with higher performance will
form a virtual CA and group key management (GKM) to
manage the keys using the (t, n) threshold cryptographic
method.
In 2013, Merad BOudia Omar Rafiq and Feham
Mohammad had proposed Fast & Secure Implementation of
ECC algorithm using Concealed Data Aggregation.
Because of which a System just needs 1.29 seconds for
encryption & Decryption as well .
In 2014, Ravi Kishore Kodali introduces
Implementation of ECC with Hidden Generator Point in
Wireless Sensor Networks. He proposes a technique for
ECC with a hidden generator point in order to overcome the
MIM (Man In Middle) attack. He used Three different
algorithms based on the distribution of points on the elliptic
cure (EC), using a different generator point for each
encrypted message and selecting different generator points
for each session is discussed.
Conclusion
In this world of technology peer to peer communication
is Very essential area as more and more applications are
coming out, the destination of this promising technology,
saying WMNs, will be well-performed, secure, and widespread
wireless connection. This paper can be used to give
a baseline for building a tight security for wireless mesh
networks. Public-key cryptography is feasible for wireless
mesh network security applications including access control.
With more and more applications coming out, the
destination of this promising technology, saying WMNs,
will be well-performed, secure, and wide-spread wireless
connection. ECC-based access control scheme in wireless
mesh network the protocol for the network to authorize a
user to access the network. Implementation of ECC on
primary field performance will increase substantially. In
future it is possible to further reduce the running time by
using more refined and careful programming. Public-key
cryptography is feasible for wireless mesh network security
applications including access control.
Comments
Post a Comment