Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments

被引:0
|
作者
Lee, Cheol-Seung [1 ]
机构
[1] Kwangju Womens Univ, Dept Teacher Training & Liberal Arts, Gwangju, South Korea
关键词
Mobile Ad-hoc Network; DH-EKE; EKE;
D O I
10.14257/ijsia.2016.10.10.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network of autonomous by multiple mobile nodes with a wireless interface in the absence of a particular network infrastructure environment is referred to as Mobile Ad-hoc network. The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc environments has been paid much attention as a wireless computing which is growing fast in the field of computer engineering With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Networks are suitable for mobile computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes Session key-Encrypted key exchange authentication mechanism for a robust authentication based on Mobile Ad-hoc Network and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.
引用
收藏
页码:135 / 146
页数:12
相关论文
共 50 条
  • [31] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [32] Robust Control in Sparse Mobile Ad-Hoc Networks
    Altman, Eitan
    Aram, Alireza
    Basar, Tamer
    Touati, Corinne
    Sarkar, Saswati
    DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 123 - +
  • [33] Analysis of Spectrum Allocation to Support Mobile Ad-hoc Networks in Contested Environments
    Nicholas, Paul J.
    Hoffman, Karla L.
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 145 - 150
  • [34] Design of Service Discovery Scheme based on Connection Degree in Mobile Ad-hoc Network Environments
    Kim, Gu Su
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 154 - 158
  • [35] An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication
    Priyadharshini, A.
    Dannana, Suresh
    Rajasekaran, Arun Sekar
    Maria, Azees
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (07):
  • [36] TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks
    Lee, KH
    Hwang, CS
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U491 - U496
  • [37] Using a cache scheme to detect misbehaving nodes in mobile ad-hoc networks
    Liu, Hongxun
    Delgado-Frias, Jose G.
    Medidi, Sirisha
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 1 - 6
  • [38] Mixed key management using Hamming Distance for mobile ad-hoc networks
    Lee, Seok-Lae
    Jeun, In-Kyung
    Song, Joo-Seok
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 665 - +
  • [39] A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
    Han, Wendie
    Zhang, Rui
    Zhang, Lei
    Wang, Lulu
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 986 - 991
  • [40] Analysis of Different Key-Distribution Schemes for Mobile Ad-hoc Network
    Sanghavi, Vishakha B.
    Sanghvi, Shreya V.
    Tada, Naren V.
    Dubay, Vijay J.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,