Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

Download Now Date Added: Apr 2010
Format: PDF

A self-protection technique is suggested for ad hoc networks, as they fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these standards do not provide any security approach for monitoring of the authentication in a distributed architecture. For the efficient monitoring of the authentication issue in ad hoc network, in this paper the authors present a self-monitored security approach for self-monitoring of key authentication for security protocol in ad hoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.