Authentication and encryption for a robotic ad hoc network using identity-based cryptography

09/23/2022
by   J Suárez-Armas, et al.
0

In some situations the communications of a place can be affected, totally lost, or not even exist. In these cases, the MANETs play an important role, allowing to establish a communications point using the different nodes of the network to reach the destination using decentralized communications. This paper proposes the implementation of a Robotic MANET, a decentralized network using robots as its nodes, which allows to move the network nodes to the desired location remotely. For this, each robot has as a core a Raspberry Pi with the capabilities to perform audio and video streaming, remote control of robots, tracking of objects, and deployment of wireless networks. To protect the network, different security mechanisms are used that allow secure authentication on the network by different nodes and encryption of information transmitted between them. All communications are protected through Identity-Based Cryptography, specifically with an Identity-Based Signcryption scheme.

READ FULL TEXT
research
08/13/2022

Using identity-based cryptography in mobile applications

This work includes a review of two cases study of mobile applications th...
research
05/13/2021

Trusted Authentication using hybrid security algorithm in VANET

Vehicular Ad Hoc Networks (VANETs) improves traffic management and reduc...
research
02/10/2019

Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network

With the development of artificial intelligence and self-driving, vehicu...
research
09/14/2022

Self-organizing Life Cycle Management of Mobile Ad hoc Networks

A Mobile Ad hoc NETwork (MANET) is a type of wireless network without an...
research
02/20/2021

Design of Ciphers based on the Geometric Structure of the Möbius Plane

Till now geometric structures don't play a major role in cryptography. G...
research
08/06/2022

Using query frequencies in tree-based revocation for certificateless authentication in VANETs

Revocation of dishonest users is not an easy problem. This paper propose...
research
03/07/2021

Design of Ciphers based on the Geometric Structure of the Laguerre and Minkowski Planes

Till now geometric structures don't play a major role in cryptography. G...

Please sign up or login with your details

Forgot password? Click here to reset