Secure wireless Ad Hoc networks using zero knowledge proof

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)
24 Downloads (Pure)

Abstract

A Mobile Ad-hoc Network (MANET) is a group of wireless mobile nodes that dynamically form a network without any pre-established infrastructure or centralized administration, Soewito (2014). Some network hops may be needed to send a packet from one node to another node in the MANET. To do the communication between the nodes, a route has to be selected in the network, therefore it need a routing protocol that manage selection of the route. Selection route in mobile ad-hoc network is not easy because nodes always move so that the topology of network always changed every time. This is a big issue in selection route in mobile ad-hoc network because the route can be broken anytime. Moreover, MANET is more vulnerable than other wireless communication types because every mobile node serves as both the host and the router and forwards packets on behalf of each other. This study presents the analyzing and evaluation several routing algorithms and a novel scheme to build an authentication system by adding the modified zero knowledge proof algorithm to each mobile node in MANET.

Original languageEnglish
Pages (from-to)2488-2493
Number of pages6
JournalJournal of Computer Science
Volume10
Issue number12
DOIs
Publication statusPublished - 26 Dec 2014
Externally publishedYes

Bibliographical note

© 2014 Benfano Soewito, Yonathan Marcellinus and Manik Hapsara. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Keywords

  • Ad hoc network
  • Security
  • Wireless network
  • Zero knowledge proof

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Secure wireless Ad Hoc networks using zero knowledge proof'. Together they form a unique fingerprint.

Cite this