Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 21
Page No. 4333 - 4354

Implementation of CDHT with ECDSA to Enhance Authentication and Secure Communication in Mobile Grid Environment

Authors : H. Parveen Begam and M.A. Maluk Mohamed

References

Abidi, A., B. Bouallegue and F. Kahri, 2014. Implementation of Elliptic Curve Digital Signature Algorithm (ECDSA). Proceedings of the 2014 Global Summit Conference on Computer and Information Technology (GSCIT), June 14-16, 2014, IEEE, Monastir, Tunisia, ISBN:978-1-4799-5626-5, pp: 1-6.

Alcaraz, C. and J. Lopez, 2014. WASAM: A dynamic wide-area situational awareness model for critical domains in smart grids. Future Gener. Comput. Syst., 30: 146-154.
Direct Link  |  

Begam, P. and M. Mohamed, 2014. ASAMO: Authentication and secure communication using abstract monitoring objects for mobile grid computing. Int. J. Comput. Sci. Appl., Vol. 3,

Bichhawat, A. and R.C. Joshi, 2010. A survey on issues in mobile grid computing. Int. J. Recent Trends Eng. Technol., 4: 15-19.
Direct Link  |  

Chaddoud, G. and K. Martin, 2006. Distributed certificate authority in cluster-based ad hoc networks. Wirel. Commun. Netw. Conf., 2: 682-688.
Direct Link  |  

Hayouni, H. and M. Hamdi, 2015. Energy efficient key menagement scheme for clustered hierarchical wireless sensor networks. Proceedings of the 2015 IEEE 12th International Conference on Networking, Sensing and Control (ICNSC), April 9-11, 2015, IEEE, Tunisia, ISBN:978-1-4799-8069-7, pp: 105-109.

Johnson, D., A. Menezes and S. Vanstone, 2001. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inform. Secur., 1: 36-63.
CrossRef  |  Direct Link  |  

Khalique, A., K. Singh and S. Sood, 2010. Implementation of elliptic curve digital signature algorithms. Int. J. Comput. Appl., 2: 21-27.
Direct Link  |  

Lashkari, A.H., M.M.S. Danesh and B. Samadi, 2009. A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology ICCSIT 2009, August 8-11, 2009, IEEE, Kuala Lumpur, Malaysia, ISBN:978-1-4244-4519-6, pp: 48-52.

Li, Y., H. Jin, D. Zou, S. Liu and Z. Han, 2008. An authenticated encryption mechanism for secure group communication in grid. Proceedings od the 2008 International Conference on Internet Computing in Science and Engineering, January 28-29, 2008, IEEE, Wuhan, China, ISBN:978-0-7695-3112-0, pp: 298-305.

Mathur, R., S. Agarwal and V. Sharma, 2015. Solving security issues in mobile computing using cryptography techniques-A survey. Proceedings of the 2015 International Conference on Computing, Communication and Automation (ICCCA), May 15-16, 2015, IEEE, Uttar Pradesh, India, ISBN:978-1-4799-8890-7, pp: 492-497.

Murthy, S.G.K., M.R. Murthy and A.C. Sarma, 2011. Elliptic curve based signature method to control fake paper based certificates. Proceedings of the World Congress on Engineering and Computer Science, October 19-21, 2011, WCECS, San Francisco, USA, ISBN:978-988-18210-9-6, pp: 1-3.

Muthukuru, J. and B. Sathyanarayana, 2013. A secure elliptic curve digital signature approach without inversion. Int. J. Eng. Adv. Technol., 3: 454-456.
Direct Link  |  

Park, Y.M., J. Kim and Y. Kim, 2013. Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks. Proceedings of the 2013 Fourth International Conference on the Network of the Future (NOF), October 23-25, 2013, IEEE, Pohang, South Korea, ISBN:978-1-4799-1644-3, pp: 1-6.

Parmar, K.B., N.N. Jani, P.S. Shrivastav and M.H. Patel, 2013. Mobile grid computing: Facts or fantasy. Int. J. Multidiscip. Sci. Eng., 4: 26-33.
Direct Link  |  

Saputro, N., K. Akkaya and S. Uludag, 2012. A survey of routing protocols for smart grid communications. Comput. Networks, 56: 2742-2771.
CrossRef  |  

Sivagurunathan, S. and K. Prathapchandran, 2014. Trust and cluster based authentication schemes in mobile Ad Hoc networks-A review. Proceedings of the 2014 International Conference on Power Signals Control and Computations (EPSCICON), January 6-11, 2014, IEEE, Gandhigram, India, ISBN:978-1-4799-3612-0, pp: 1-5.

Stoica, I., R. Morris, D. Karger, M.F. Kaashoek and H. Balakrishnan, 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. Comput. Commun. Rev., 31: 149-160.
CrossRef  |  Direct Link  |  

Woungang, I., F.H. Tseng, Y.H. Lin, L.D. Chou and H.C. Chao et al., 2015. MR-Chord: Improved chord lookup performance in structured mobile P2P networks. IEEE. Syst. J., 9: 743-751.
CrossRef  |  Direct Link  |  

Xiong, H., D. Zhang, L. Wang and H. Chaouchi, 2015. EMC 3: Energy-efficient data transfer in mobile crowdsensing under full coverage constraint. IEEE. Trans, Mob. Comput., 14: 1355-1368.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved