Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks

Rovin Tiwari, Megha Nema


  • Rovin Tiwari Electronics And Communication Engineering Amity University Gwalior, India
  • Megha Nema Computer Science Engineering Barkatullah University Bhopal, India



Antenna, Bandwidth, Return loss, CST, Microstrip, Reso-nant.


Mobile ad hoc networks (MANETs) are normal in improving road wellbeing and traffic conditions, in which security is basic. In MANETs, the authentication of the mobile access control is a vital security administration for both inter?vehicle and vehicle–roadside unit correspondences. In the mean time, vehicles additionally must be kept from the abuse of the private data and the assaults on their privacy. There is various research works concentrating on giving the mysterious authentication protected privacy in MANETs. In this paper, we explicitly give a review on the privacy?preserving authentication (PPA) plans proposed for MANETs. We research and sort the current PPA plots by their key cryptographies for authentication and the systems for privacy safeguarding. We likewise give a near report/rundown of the advantages and disadvantages of the current PPA plans.


Download data is not yet available.


1. D. Zheng, C. Jing, R. Guo, S. Gao and L. Wang, "A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in MANETs," in IEEE Access, Vol. 7, pp. 117716-117726, 2019.
2. Z. Wei, J. Li, X. Wang and C. Gao, "A Lightweight Privacy-Preserving Protocol for MANETs Based on Secure Outsourcing Computing," in IEEE Access, Vol. 7, pp. 62785-62793, 2019.
3. H. Tan, Z. Gui and I. Chung, "A Secure and Efficient Certificate-less Authentication Scheme With Unsupervised Anomaly Detec-tion in MANETs," in IEEE Access, Vol. 6, pp. 74260-74276, 2018.
4. C. Sun, J. Liu, X. Xu and J. Ma, "A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in MANETs," in IEEE Ac-cess, Vol. 5, pp. 24012-24022, 2017.
5. A. Khan, “QoS Improvement using DRAODV under Variable Transmission Range in MANET”, SMART MOVES JOURNAL IJOSCIENCE, Vol. 3, No. 12, Dec. 2017.
6. H. Zhong, J. Wen, J. Cui and S. Zhang, "Efficient conditional privacy-preserving and authentication scheme for secure service provision in MANET," in Tsinghua Science and Technology, Vol. 21, No. 6, pp. 620-629, Dec. 2016
7. D. He, S. Zeadally, B. Xu and X. Huang, "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Mobile Ad Hoc Networks," in IEEE Transactions on Infor-mation Forensics and Security, Vol. 10, No. 12, pp. 2681-2691, Dec. 2015.
8. S. Guo, D. Zeng and Y. Xiang, "Chameleon Hashing for Secure and Privacy-Preserving Mobile Communications," in IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 11, pp. 2794-2803, Nov. 2014.
9. S. Biswas and J. Miši?, "A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled MANETs," in IEEE Transactions on Mobile Technology, Vol. 62, No. 5, pp. 2182-2192, Jun 2013.
10. R. Lu, X. Lin, X. Liang and X. Shen, "A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Ser-vices in MANETs," in IEEE Transactions on Intelligent Trans-portation Systems, Vol. 13, No. 1, pp. 127-139, March 2012.
11. J. Sun, C. Zhang, Y. Zhang and Y. Fang, "An Identity-Based Security System for User Privacy in Mobile Ad Hoc Networks," in IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 9, pp. 1227-1239, Sept. 2010.
12. J. Sun, Y. Fang, "Defense Against Misbehavior in Anonymous Mobile Ad Hoc Networks", Ad Hoc Networks, Vol. 7, No. 8, pp. 1515-1525, Nov. 2009.




How to Cite

Tiwari, R., & Nema, M. (2019). Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks: Rovin Tiwari, Megha Nema. SMART MOVES JOURNAL IJOSCIENCE, 5(8), 11–14.