A Prototype Model of Virtual Authenticated Key Exchange Mechanism over Secured Channel in Ad-Hoc Environment
S. Malathi1, C. Mohan2, M. Arun3, R. Kalpana4, M. Athigopal5
1S. Malathi., Assistant Professor, Sri Krishna Adithya College of Arts and Science, Coimbatore, India.
2Dr. C. Mohan., Assistant Professor in Department of Computer Science, The American College, Madurai, India.
3M. Arun., Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India
4R. Kalpana., Assistant Professor in Sri Krishna Adithya College of Arts and Science, Coimbatore, India
5M. Athigopal, Assistant Professor in Subbalakshmi Lakshmipathy College of Science, Madurai, India.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 5526-5532 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6684018520 /2020©BEIESP | DOI: 10.35940/ijrte.E6684.018520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Key exchange protocols play a vital role in symmetric key cryptography. The transfer of private key through the secured medium is a challenging task because every day the intruders are evolved and the attacks are increasing constantly. The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols. That challenges demanding new protocol or methodology of transferring secret key between the parties. The paper proposes a new, secured, less computational overhead key exchange mechanism using short message service available in the cellular networks. GSM-SMS is a highly established secured channel and the research uses this facility to transfer the key between senders to a receiver of the symmetric key cryptosystem. The private key no need to reveal to third parties or even the receiver because the sender can directly communicate to the decryption system through the mobile SMS. After the decryption process, the secret key will be destroyed immediately. There is no possible attack during the key transfer and loss and error of the communication are very less.
Keywords: Cryptography, Key exchange protocol, Mobile Environment, SMS.
Scope of the Article: Environmental Engineering