Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments

被引:0
|
作者
Lee, Cheol-Seung [1 ]
机构
[1] Kwangju Womens Univ, Dept Teacher Training & Liberal Arts, Gwangju, South Korea
关键词
Mobile Ad-hoc Network; DH-EKE; EKE;
D O I
10.14257/ijsia.2016.10.10.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network of autonomous by multiple mobile nodes with a wireless interface in the absence of a particular network infrastructure environment is referred to as Mobile Ad-hoc network. The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc environments has been paid much attention as a wireless computing which is growing fast in the field of computer engineering With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Networks are suitable for mobile computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes Session key-Encrypted key exchange authentication mechanism for a robust authentication based on Mobile Ad-hoc Network and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.
引用
收藏
页码:135 / 146
页数:12
相关论文
共 50 条
  • [1] Robust Key Management Scheme for Certification in Mobile Ad-hoc Networks
    Hamouid, K.
    Adi, K.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 354 - +
  • [2] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [3] Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
    Lee, Hyewon K.
    Choi, Jaeyoung
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 653 - 661
  • [4] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
    Dey, Haimabati
    Datta, Raja
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
  • [5] An effective trust establishment scheme for authentication in Mobile Ad-Hoc Networks
    Wang, Guojun
    Wang, Qiong
    Ca, Jiannong
    Guo, Minyi
    2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 749 - +
  • [6] An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc Networks
    Ayyasamy, Rajaram
    Subramani, Palaniswami
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (03) : 291 - 298
  • [7] An Efficient Pairwise Key Establishment Scheme for Ad-hoc Mobile Clouds
    Mandal, Subhajit
    Yang, Chen
    Altaweel, Ala
    Stoleru, Radu
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 627 - 634
  • [8] An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks
    Yang, Yang
    Hu, Yupu
    Sun, Chunhui
    Lv, Chao
    Zhang, Leyou
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (01) : 10 - 17
  • [9] An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing
    Dimitrios D. Vergados
    Giannis Stergiou
    Wireless Personal Communications, 2007, 43 : 1767 - 1780
  • [10] An authentication scheme for Ad-hoc networks using threshold secret sharing
    Vergados, Dirnitrios D.
    Stergiou, Giannis
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 43 (04) : 1767 - 1780