Reference Hub4
A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET

A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET

Pooja Verma
Copyright: © 2019 |Pages: 30
ISBN13: 9781522557425|ISBN10: 1522557423|ISBN13 Softcover: 9781522586296|EISBN13: 9781522557432
DOI: 10.4018/978-1-5225-5742-5.ch007
Cite Chapter Cite Chapter

MLA

Verma, Pooja. "A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET." Cryptographic Security Solutions for the Internet of Things, edited by Mohammad Tariq Banday, IGI Global, 2019, pp. 181-210. https://doi.org/10.4018/978-1-5225-5742-5.ch007

APA

Verma, P. (2019). A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET. In M. Banday (Ed.), Cryptographic Security Solutions for the Internet of Things (pp. 181-210). IGI Global. https://doi.org/10.4018/978-1-5225-5742-5.ch007

Chicago

Verma, Pooja. "A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET." In Cryptographic Security Solutions for the Internet of Things, edited by Mohammad Tariq Banday, 181-210. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-5742-5.ch007

Export Reference

Mendeley
Favorite

Abstract

Integration procedures are employed to increase and enhance computing networks and their application domain. Extensive studies towards the integration of MANET with the internet have been studied and worked towards addressing various challenges for such integration. Some idyllic mechanisms always fail due to the presence of some nasty node or other problems such as face alteration and eavesdropping. The focus of this chapter is on the design and discovery of secure gateway scheme in MANET employing trust-based security factors such as route trust and load ability. Over these, the elliptic curve cryptography is applied to achieve confidentiality, integrity, and authentication while selecting optimum gateway node that has less bandwidth, key storage space, and faster computational time. Simulation results of the security protocol through SPAN for AVISPA tool have shown encouraging results over two model checkers namely OFMC and CL-AtSe.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.