Loading

Hierarchal Trust Certificate Distribution using Distributed CA in MANET
V. Vinoth Kumar1, K. S. Arvind2, S. Umamaheswaran3, Suganya K.S4

1Dr. V. Vinoth Kumar, Associate Professor, Department of Computer Science & Engineering, MVJ College of Engineering, Bangalore, India.
2Dr. K.S. Arvind, Associate Professor, Department of Computer Science & Engineering, MVJ College of Engineering, Bangalore, India.
3Dr. S. Umamaheswaran, Associate Professor, Department of Computer Science & Engineering, MVJ College of Engineering, Bangalore, India.
4K.S. Suganya, Assistant Professor, Department of Information Technology, Bannari Amman Institute of Technology, India,

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2521-2524 | Volume-8 Issue-10, August 2019 | Retrieval Number: J95600881019/2019©BEIESP | DOI: 10.35940/ijitee.J9560.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the growing network generation of wireless systems, there is a necessity usage of deploying wireless network for usage of individual mobile users. The considerable examples are the deploying MANET in emergency situations like disaster, military surveillance, tactical networks, data networks etc. This network situation doesn’t work on centralized and adopt the rely operations without access points. All these application areas adopts infrastructure less environment which facilitates highly possible network attacks. Identifying such a security breach happening in network would be a Herculean task. This research identifies trusted parties will involve in message communication and provides privacy of the message being sent to destination using cryptographic mechanisms. When two or more networks involve in data communication at that situation making the authentication with the help of certification distribution method would be a difficult task. Hence the nodes are dropping the packet or unauthorized parties do the denial of service so that delay will increase and throughput is reduced. In order to overcome this issue, the cross certification method is implemented with the distribution of certificate using hierarchal trust. This method solves the issue of authentication problem and coordinates for all the nodes to communicate to each other as a trusted party. When two ad hoc networks merge, we need a mechanisms for nodes originated from different networks to certify and authenticate each other. Finally the simulation was conducted with certain parameters and achieved better throughput and reduced delay of data transfer.
Keywords: Digital Certificate, Trust Model, TLS, MANET, AODV

Scope of the Article: Distributed Sensor Networks