ASPG Menu
search

American Scientific Publishing Group

verified Journal

Fusion: Practice and Applications

ISSN
Online: 2692-4048 Print: 2770-0070
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Fusion: Practice and Applications
Full Length Article

Volume 13Issue 2PP: 127-135 • 2023

Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property

D. Neela M. Shyam 1* ,
Mohammed Ali Hussain 1
1Department of Computer Science & Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram Guntur Dist., A.P., India
* Corresponding Author.
Received: April 10, 2023 Revised: July 22, 2023 Accepted: October 05, 2023

Abstract

Because wireless infrastructure-less networks are dynamic, varied, and scattered, implementing security in them is exceedingly difficult. Authentication is the most crucial prerequisite for security deployment. It is difficult to implement security based on public-key infrastructure with centralized third-party authentication in an environment without infrastructure. We build and test a chaotic map-based technique that handles authentication as one of the key qualities to accomplish security. We allocate the key management responsibility to cluster-heads after dividing the infrastructure-less into several clusters with cluster-heads. The Diffie-Helman property, which is based on Chebyshev polynomials, is used in the proposed work to establish authentication. Our suggested method avoids unnecessary computations like modular exponentiation and elliptical curve scalar multiplications. It also ensures that the secret session-key is only established between the two designated entities and is resistant to a variety of network attacks.

Keywords

Wireless Infra structure less networks authenticated key agreement clusters Diffie-Helman Property attacks.

References

[1]           Bang, Ankur O., and Prabhakar L. Ramteke. "MANET: History, challenges and applications." International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2.9 (2013): 249-251.

[2]           Raja, L., and S. Santhosh Baboo. "An overview of MANET: Applications, attacks and challenges." International journal of computer science and mobile computing 3.1 (2014): 408-417.

[3]           Chitkara, Mahima, and Mohd Waseem Ahmad. "Review on manet: characteristics, challenges, imperatives and routing protocols." International journal of computer science and mobile computing 3.2 (2014): 432-437.

[4]           Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.

[5]           Yadav, Dega Ravi Kumar, K. Nikitha Reddy, and N. Vamshi Krishna. "Authenticated Mutual Communication between two Nodes in MANETs." International Journal of Computer Science and Information Technologies 4.2 (2013): 331-333.

[6]           Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Energy-Aware Reliable Routing by Considering Current Residual Condition of Nodes in MANETs." Soft Computing in Data Analytics. Springer, Singapore, 2019. 441-452.

[7]           Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network." International Journal of Hybrid Intelligence 1.2-3 (2019): 239-267.

[8]           Mason, John C., and David C. Handscomb. Chebyshev polynomials. Chapman and Hall/CRC, 2002.

[9]           Tse, David, and Pramod Viswanath. Fundamentals of wireless communication. Cambridge university press, 2005.

[10]        Rafaeli, Sandro, and David Hutchison. "A survey of key management for secure group communication." ACM Computing Surveys (CSUR) 35.3 (2003): 309-329.

[11]        He, Xiaobing, Michael Niedermeier, and Hermann De Meer. "Dynamic key management in wireless sensor networks: A survey." Journal of network and computer applications 36.2 (2013): 611-622.

[12]        A. Irshad, M. Sher, S. A. Chaudhry, H. Naqvi, and M. S. Farash, "An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre," The Journal of Supercomputing, vol. 72, pp. 1623–1644, Mar. 2016. [Online]. Available: https://link.springer.com/article/10.1007/s11227-016-1688-9.

[13]        J. Li, X. Niu, and W. Sun, "Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps," International Journal of Distributed Sensor Networks, vol. 11, no. 3, p. 793592, Mar. 2015. [Online]. Available: https://journals.sagepub.com/doi/10.1155/2015/793592.

[14]        A. Irshad, M. Sher, S. A. Chaudhry, H. Naqvi, and M. S. Farash, "An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre," The Journal of Supercomputing, vol. 72, pp. 1623–1644, Mar. 2016. [Online]. Available: https://link.springer.com/article/10.1007/s11227-016-1688-9

[15]        J. Li, X. Niu, and W. Sun, "Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps," International Journal of Distributed Sensor Networks, vol. 11, no. 3, p. 793592, Mar. 2015. [Online]. Available: https://journals.sagepub.com/doi/10.1155/2015/793592

[16]        A. Irshad, M. Sher, S. A. Chaudhry, H. Naqvi, and M. S. Farash, "An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre," The Journal of Supercomputing, vol. 72, pp. 1623–1644, Mar. 2016. [Online]. Available: https://link.springer.com/article/10.1007/s11227-016-1688-9

[17]        Balakrishnan, C.; Ambeth Kumar, V.D. IoT-Enabled Classification of Echocardiogram Images for Cardiovascular Disease Risk Prediction with Pre-Trained Recurrent Convolutional Neural Networks. Diagnostics 2023, 13, 775. https://doi.org/10.3390/diagnostics13040775

[18]        Sathya Preiya, V.; Kumar, V.D.A. Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics 2023, 13, 1983. https://doi.org/10.3390/diagnostics13121983.

Cite This Article

Choose your preferred format

format_quote
Shyam, D. Neela M., Hussain, Mohammed Ali. "Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property." Fusion: Practice and Applications, vol. Volume 13, no. Issue 2, 2023, pp. 127-135. DOI: https://doi.org/10.54216/FPA.130211
Shyam, D., Hussain, M. (2023). Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property. Fusion: Practice and Applications, Volume 13(Issue 2), 127-135. DOI: https://doi.org/10.54216/FPA.130211
Shyam, D. Neela M., Hussain, Mohammed Ali. "Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property." Fusion: Practice and Applications Volume 13, no. Issue 2 (2023): 127-135. DOI: https://doi.org/10.54216/FPA.130211
Shyam, D., Hussain, M. (2023) 'Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property', Fusion: Practice and Applications, Volume 13(Issue 2), pp. 127-135. DOI: https://doi.org/10.54216/FPA.130211
Shyam D, Hussain M. Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property. Fusion: Practice and Applications. 2023;Volume 13(Issue 2):127-135. DOI: https://doi.org/10.54216/FPA.130211
D. Shyam, M. Hussain, "Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property," Fusion: Practice and Applications, vol. Volume 13, no. Issue 2, pp. 127-135, 2023. DOI: https://doi.org/10.54216/FPA.130211
Digital Archive Ready