Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks
Rovin Tiwari, Megha Nema
DOI:
https://doi.org/10.24113/ijoscience.v5i8.288Keywords:
Antenna, Bandwidth, Return loss, CST, Microstrip, Reso-nant.Abstract
Mobile ad hoc networks (MANETs) are normal in improving road wellbeing and traffic conditions, in which security is basic. In MANETs, the authentication of the mobile access control is a vital security administration for both inter?vehicle and vehicle–roadside unit correspondences. In the mean time, vehicles additionally must be kept from the abuse of the private data and the assaults on their privacy. There is various research works concentrating on giving the mysterious authentication protected privacy in MANETs. In this paper, we explicitly give a review on the privacy?preserving authentication (PPA) plans proposed for MANETs. We research and sort the current PPA plots by their key cryptographies for authentication and the systems for privacy safeguarding. We likewise give a near report/rundown of the advantages and disadvantages of the current PPA plans.
Downloads
References
2. Z. Wei, J. Li, X. Wang and C. Gao, "A Lightweight Privacy-Preserving Protocol for MANETs Based on Secure Outsourcing Computing," in IEEE Access, Vol. 7, pp. 62785-62793, 2019.
3. H. Tan, Z. Gui and I. Chung, "A Secure and Efficient Certificate-less Authentication Scheme With Unsupervised Anomaly Detec-tion in MANETs," in IEEE Access, Vol. 6, pp. 74260-74276, 2018.
4. C. Sun, J. Liu, X. Xu and J. Ma, "A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in MANETs," in IEEE Ac-cess, Vol. 5, pp. 24012-24022, 2017.
5. A. Khan, “QoS Improvement using DRAODV under Variable Transmission Range in MANET”, SMART MOVES JOURNAL IJOSCIENCE, Vol. 3, No. 12, Dec. 2017. https://doi.org/10.24113/ijoscience.v3i12.8
6. H. Zhong, J. Wen, J. Cui and S. Zhang, "Efficient conditional privacy-preserving and authentication scheme for secure service provision in MANET," in Tsinghua Science and Technology, Vol. 21, No. 6, pp. 620-629, Dec. 2016
7. D. He, S. Zeadally, B. Xu and X. Huang, "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Mobile Ad Hoc Networks," in IEEE Transactions on Infor-mation Forensics and Security, Vol. 10, No. 12, pp. 2681-2691, Dec. 2015.
8. S. Guo, D. Zeng and Y. Xiang, "Chameleon Hashing for Secure and Privacy-Preserving Mobile Communications," in IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 11, pp. 2794-2803, Nov. 2014.
9. S. Biswas and J. Miši?, "A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled MANETs," in IEEE Transactions on Mobile Technology, Vol. 62, No. 5, pp. 2182-2192, Jun 2013.
10. R. Lu, X. Lin, X. Liang and X. Shen, "A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Ser-vices in MANETs," in IEEE Transactions on Intelligent Trans-portation Systems, Vol. 13, No. 1, pp. 127-139, March 2012.
11. J. Sun, C. Zhang, Y. Zhang and Y. Fang, "An Identity-Based Security System for User Privacy in Mobile Ad Hoc Networks," in IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 9, pp. 1227-1239, Sept. 2010.
12. J. Sun, Y. Fang, "Defense Against Misbehavior in Anonymous Mobile Ad Hoc Networks", Ad Hoc Networks, Vol. 7, No. 8, pp. 1515-1525, Nov. 2009.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Rovin Tiwari, Megha Nema

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.