{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:41:41Z","timestamp":1651833701177},"reference-count":32,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>Key agreement (KA) without the use of a central authority is an elementary cryptographic problem to ensure security in MANETs because such networks consist of movable nodes with no fixed infrastructure or no central administration. The nodes communicate via wireless channels that are more prone to security attacks. A majority of the existing KA protocols assume the existence of central authority and hence, not perfectly suitable for a MANET environment. Proposed 2P-NCKA (Two-Party Non-Central authority KA) protocol creates a secret key between two users for a MANET which does not assume the use of a central authority and a prior password. It uses pairings, a verifiable secret sharing scheme and routing protocol. The AOPMDV protocol allows transmission of multiple packets across multiple node-disjoint paths in parallel so that one packet is in each path. This article also cryptanalyzes Li's KA protocol and has proven its vulnerability towards a man-in-the-middle (MITM) attack. The 2P-NCKA protocol is secure against MITM attacks and all known attacks and addresses problems of Li's protocol with a small increase in execution time.<\/jats:p>","DOI":"10.4018\/ijisp.2019100105","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:33:27Z","timestamp":1568385207000},"page":"68-88","source":"Crossref","is-referenced-by-count":0,"title":["Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks"],"prefix":"10.4018","volume":"13","author":[{"given":"Asha Jyothi","family":"Ch","sequence":"first","affiliation":[{"name":"JNTUH College of Engineering, Jagtial, India"}]},{"family":"Narsimha G.","sequence":"additional","affiliation":[{"name":"JNTUH Hyderabad, Hyderabad, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019100105-0","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286437"},{"key":"IJISP.2019100105-1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.089580"},{"key":"IJISP.2019100105-2","unstructured":"Ben Lynn. (n.d.). PBC (Pairing-Based Cryptography) Library. Retrieved from http:\/\/crypto.stanford.edu\/pbc"},{"key":"IJISP.2019100105-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2011.04.021"},{"key":"IJISP.2019100105-4","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDP7210"},{"key":"IJISP.2019100105-5","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718772545"},{"key":"IJISP.2019100105-6","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.1822"},{"key":"IJISP.2019100105-7","doi-asserted-by":"publisher","DOI":"10.4156\/aiss.vol4.issue23.32"},{"key":"IJISP.2019100105-8","doi-asserted-by":"crossref","unstructured":"Kisung, P., Youngho, P., Yohan, P., & Das, A.K. (2018). 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. IEEE Access, 6, 30225-30241. doi:10.110 9\/ACCESS.2018.2844190","DOI":"10.1109\/ACCESS.2018.2844190"},{"key":"IJISP.2019100105-9","first-page":"155","article-title":"Security and efficiency enhancement of robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks","volume":"34","author":"C.-T.Li","year":"2018","journal-title":"Journal of Information Science and Engineering"},{"key":"IJISP.2019100105-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.316"},{"key":"IJISP.2019100105-11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79549-0_15"},{"key":"IJISP.2019100105-12","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.46.3.14968"},{"key":"IJISP.2019100105-13","author":"A.Menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"IJISP.2019100105-14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2507-2"},{"key":"IJISP.2019100105-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.01.041"},{"key":"IJISP.2019100105-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.05.015"},{"key":"IJISP.2019100105-17","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(02)00306-0"},{"key":"IJISP.2019100105-18","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2005.11441770"},{"key":"IJISP.2019100105-19","doi-asserted-by":"publisher","DOI":"10.4018\/IJBDCN.2016070104"},{"key":"IJISP.2019100105-20","doi-asserted-by":"publisher","DOI":"10.3837\/ tiis.2019.02.027"},{"key":"IJISP.2019100105-21","doi-asserted-by":"publisher","DOI":"10.1142\/S1793830917500021"},{"key":"IJISP.2019100105-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5303-0"},{"key":"IJISP.2019100105-23","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2018040103"},{"key":"IJISP.2019100105-24","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-012-9103-y"},{"issue":"3","key":"IJISP.2019100105-25","first-page":"142","article-title":"Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings","volume":"14","author":"Y.Tian","year":"2012","journal-title":"International Journal of Network Security"},{"key":"IJISP.2019100105-26","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-006-0189-8"},{"key":"IJISP.2019100105-27","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-006-0189-8"},{"key":"IJISP.2019100105-28","doi-asserted-by":"publisher","DOI":"10.1007\/ BFb0024447"},{"key":"IJISP.2019100105-29","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2019.097093"},{"key":"IJISP.2019100105-30","doi-asserted-by":"publisher","DOI":"10.1007\/11751649_30"},{"key":"IJISP.2019100105-31","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3198"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=237211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:59:14Z","timestamp":1651831154000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019100105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019100105","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}