SlideShare a Scribd company logo
Securing Mobile Ad Hoc
Networks through Mobility
based Clustering and Threshold
Cryptography
By
A.Prem kumar
What is MANET?
Mobile Ad-Hoc network (MANET) is one
where there is no fixed infrastructure such as
base stations or mobile switching centers.
Why it is for ?
characteristics of Mobile Ad Hoc networks (MANETs)
pose a number of non-trivial challenges to security design.
Stages of the algorithm
1. Discovery Stage
2. Merging Stage
3. Maintaining Stage
INTRODUCTION
1. Cluster formation
2. Each cluster Initiates a merging process
The threshold security technique uses the (n,p)
threshold scheme where some secret data D is
divided into n pieces D1,D2,…..Dn in such a
way that:
1. Knowledge of any p or more Di pieces makes
D easily
computable.
2. Knowledge of any (p-1) or fewer Di pieces
makes D
completely undetermined
1.EACH NODE CALCULATES IT’S
LOCAL STABILITY VALUE.
2.IF IT’S LESS, THAT ASSUMES
STATES OF CLUSTER HEAD
1.Discovery Stage
2.MERGING STAGE
There are two cases that may initiate a
merging process:
1. A non-clustered node requests to join
the neighboring clusters.
2. Two neighboring gateways request to
merge their clusters.
3.MAINTAINING STAGE
We first consider two cases that may cause
topology
changes in MANET and thus invoke cluster
maintenancestage:
1. A node switches on and joins the network.
2. A node switches off and leaves the network
KEY MANAGEMENT SERVICE
1.Efficient secret key schemes are used to
secure further communication after nodes
authenticate each other and establish a shared
secret session key.
2.In a public key infrastructure, each node has
a
public/private key pair. Public keys can be
distributed to other nodes, while private keys
should be kept confidential to individual nodes.
ENCRIPTION &
DECRIPTION
Securing Mobile
THRESHOLD CRYPTOGRAPHY
An (n, p) threshold cryptography scheme allows
n parties to share the ability to perform a
cryptographic operation (e.g., creating a digital
signature), so that any p parties can perform
this operation jointly, whereas it is infeasible for
at most (p-1) parties to do so, even by
collusion.
Key Management Service K/k
CONCLUSION
1.The idea of using the threshold cryptography
combined with mobility based clustering is
worth examining further to establish its full
potential.
2.To build a highly available and secure key
management service, we propose to use
threshold cryptography to distributed trust
among a set of servers.
Queries..?
THANK YOU

More Related Content

PDF
Secure key exchange and encryption mechanism for group communication in wirel...
PDF
Cryptography & Security
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
PDF
Secured key distribution techniques in wireless sensor networks 150429171406
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Key Distribution Problem in advanced operating system
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Secure key exchange and encryption mechanism for group communication in wirel...
Cryptography & Security
key aggregate cryptosystem for scalable data sharing in cloud
Secured key distribution techniques in wireless sensor networks 150429171406
key-aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key Distribution Problem in advanced operating system
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

What's hot (20)

DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Deniable Encryption Key
PPTX
Naman quantum cryptography
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Quantum Key Distribution
PPTX
Key distribution code.ppt
PPTX
Key management and distribution
PPTX
Group 6
PDF
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
PDF
Lecture12
PDF
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
PDF
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
PPTX
Cryptographic tools
 
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
PPT
Information Security & Cryptography
PPTX
Quantum Cryptography
PPT
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
PPT
SSL & TLS Architecture short
PPTX
Cryptography
key-aggregate cryptosystem for scalable data sharing in cloud storage
Deniable Encryption Key
Naman quantum cryptography
Key aggregate cryptosystem for scalable data sharing in cloud storage
Quantum Key Distribution
Key distribution code.ppt
Key management and distribution
Group 6
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Lecture12
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Cryptographic tools
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Information Security & Cryptography
Quantum Cryptography
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
SSL & TLS Architecture short
Cryptography
Ad

Viewers also liked (20)

DOCX
Chord waktu yang salah
PPT
Nano technology
PPTX
Pathways academy powerpoint 2017
PPT
PPT
Network security
PPTX
Mobile jamming
PPT
Thermal Power Plant
PPT
Albert einstein
PPTX
Wi-Fi
PDF
Alcohol Awareness Month
PPT
Peace, Love, and Respect
PPTX
Q1) In what ways does your media product use, develop or challenge forms and ...
PPT
World widetelescopetecfest
PDF
Media Star 2015
PPT
Einstein chrismason
PPT
4 g communications
PPTX
Test proj
PPT
network security
PPT
Wifi vignan final
PPTX
Googledriverlesscar
Chord waktu yang salah
Nano technology
Pathways academy powerpoint 2017
Network security
Mobile jamming
Thermal Power Plant
Albert einstein
Wi-Fi
Alcohol Awareness Month
Peace, Love, and Respect
Q1) In what ways does your media product use, develop or challenge forms and ...
World widetelescopetecfest
Media Star 2015
Einstein chrismason
4 g communications
Test proj
network security
Wifi vignan final
Googledriverlesscar
Ad

Similar to Securing Mobile (20)

PDF
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
PDF
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
PDF
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
PDF
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
PDF
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
PDF
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
PDF
Node Authentication Using BLS Signature in Distributed PKI Based MANETS
PDF
Security challenges in mobile ad hoc
PDF
Iaetsd baack better adaptive
PDF
Security in MANET based on PKI using fuzzy function
PPT
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
PDF
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
PDF
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
PDF
An analysis of security challenges in mobile ad hoc networks
PDF
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
PDF
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
PDF
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
PDF
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
PDF
A Survey of Key Management Framework for Wireless Mobile Environment
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Node Authentication Using BLS Signature in Distributed PKI Based MANETS
Security challenges in mobile ad hoc
Iaetsd baack better adaptive
Security in MANET based on PKI using fuzzy function
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
An analysis of security challenges in mobile ad hoc networks
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
A Survey of Key Management Framework for Wireless Mobile Environment

More from PREMKUMAR (18)

PPT
Redtacton
PPT
Global wireless e-voting
PPT
Steganography
PPTX
Wireless sensor network
PPTX
Android
PPTX
3G technology
PPTX
Robotics
PPTX
Face Morphing
PPT
NANO ROBOTICS
PPTX
nuclear BATTERY
PPT
Memristor techonolgy
PPTX
11 brain finger printing
PPT
Non conventional energy sources
PPTX
Widescreen PowerPoint
PPT
PPT
Power aware cloud metering
PPT
Agriculture field monitoring
PPTX
Canal of design
Redtacton
Global wireless e-voting
Steganography
Wireless sensor network
Android
3G technology
Robotics
Face Morphing
NANO ROBOTICS
nuclear BATTERY
Memristor techonolgy
11 brain finger printing
Non conventional energy sources
Widescreen PowerPoint
Power aware cloud metering
Agriculture field monitoring
Canal of design

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Modernizing your data center with Dell and AMD
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks

Securing Mobile

  • 1. Securing Mobile Ad Hoc Networks through Mobility based Clustering and Threshold Cryptography By A.Prem kumar
  • 2. What is MANET? Mobile Ad-Hoc network (MANET) is one where there is no fixed infrastructure such as base stations or mobile switching centers.
  • 3. Why it is for ? characteristics of Mobile Ad Hoc networks (MANETs) pose a number of non-trivial challenges to security design.
  • 4. Stages of the algorithm 1. Discovery Stage 2. Merging Stage 3. Maintaining Stage
  • 5. INTRODUCTION 1. Cluster formation 2. Each cluster Initiates a merging process The threshold security technique uses the (n,p) threshold scheme where some secret data D is divided into n pieces D1,D2,…..Dn in such a way that: 1. Knowledge of any p or more Di pieces makes D easily computable. 2. Knowledge of any (p-1) or fewer Di pieces makes D completely undetermined
  • 6. 1.EACH NODE CALCULATES IT’S LOCAL STABILITY VALUE. 2.IF IT’S LESS, THAT ASSUMES STATES OF CLUSTER HEAD 1.Discovery Stage
  • 7. 2.MERGING STAGE There are two cases that may initiate a merging process: 1. A non-clustered node requests to join the neighboring clusters. 2. Two neighboring gateways request to merge their clusters.
  • 8. 3.MAINTAINING STAGE We first consider two cases that may cause topology changes in MANET and thus invoke cluster maintenancestage: 1. A node switches on and joins the network. 2. A node switches off and leaves the network
  • 9. KEY MANAGEMENT SERVICE 1.Efficient secret key schemes are used to secure further communication after nodes authenticate each other and establish a shared secret session key. 2.In a public key infrastructure, each node has a public/private key pair. Public keys can be distributed to other nodes, while private keys should be kept confidential to individual nodes.
  • 12. THRESHOLD CRYPTOGRAPHY An (n, p) threshold cryptography scheme allows n parties to share the ability to perform a cryptographic operation (e.g., creating a digital signature), so that any p parties can perform this operation jointly, whereas it is infeasible for at most (p-1) parties to do so, even by collusion.
  • 14. CONCLUSION 1.The idea of using the threshold cryptography combined with mobility based clustering is worth examining further to establish its full potential. 2.To build a highly available and secure key management service, we propose to use threshold cryptography to distributed trust among a set of servers.