Multilevel Security Model Using Distributed Keys in MANET

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir's (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into 'N' parts and distributed to 'N' nodes in network. So when user wants his private key to sign message he just requests 'T' or more key shares from any 'T' out of 'N' nodes to reconstruct private key. But t-1 shares can't reconstruct the private key.
Download Now

Find By Topic