Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

Article ID

CSTNWS778AW

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

Ch. Asha Jyothi
Ch. Asha Jyothi JNTUH College of Engineering Jagtial
G. Narsimha
G. Narsimha
J. Prathap
J. Prathap
Gorti VNKV Subba Rao
Gorti VNKV Subba Rao
DOI

Abstract

In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need of sharing a key between the two communicating entities without the use of central trusted authority. So we present a decentralized two-party key agreement protocol using pairings and threshold cryptography ideas. Our model is based on Joux’s three-party key agreement protocol which does not authenticate the users and hence is vulnerable to man-in-the-middle attack. This model protects from man-in-the-middle attack using threshold cryptography.

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need of sharing a key between the two communicating entities without the use of central trusted authority. So we present a decentralized two-party key agreement protocol using pairings and threshold cryptography ideas. Our model is based on Joux’s three-party key agreement protocol which does not authenticate the users and hence is vulnerable to man-in-the-middle attack. This model protects from man-in-the-middle attack using threshold cryptography.

Ch. Asha Jyothi
Ch. Asha Jyothi JNTUH College of Engineering Jagtial
G. Narsimha
G. Narsimha
J. Prathap
J. Prathap
Gorti VNKV Subba Rao
Gorti VNKV Subba Rao

No Figures found in article.

Ch. Asha Jyothi. 2015. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
GJCST-E Classification: C.2.2
Keywords
Article Matrices
Total Views: 8140
Total Downloads: 2096
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

Ch. Asha Jyothi
Ch. Asha Jyothi JNTUH College of Engineering Jagtial
G. Narsimha
G. Narsimha
J. Prathap
J. Prathap
Gorti VNKV Subba Rao
Gorti VNKV Subba Rao

Research Journals