Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments

被引:0
|
作者
Lee, Cheol-Seung [1 ]
机构
[1] Kwangju Womens Univ, Dept Teacher Training & Liberal Arts, Gwangju, South Korea
关键词
Mobile Ad-hoc Network; DH-EKE; EKE;
D O I
10.14257/ijsia.2016.10.10.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network of autonomous by multiple mobile nodes with a wireless interface in the absence of a particular network infrastructure environment is referred to as Mobile Ad-hoc network. The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc environments has been paid much attention as a wireless computing which is growing fast in the field of computer engineering With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Networks are suitable for mobile computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes Session key-Encrypted key exchange authentication mechanism for a robust authentication based on Mobile Ad-hoc Network and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.
引用
收藏
页码:135 / 146
页数:12
相关论文
共 50 条
  • [41] A robust resolution-enhancement scheme for video transmission over mobile ad-hoc networks
    Zhou, Liang
    Zheng, Baoyu
    Wei, Anne
    Geller, Benoit
    Cui, Jingwu
    IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (02) : 312 - 321
  • [42] Lightweight Authentication-based Scheme for AODV in Ad-hoc Networks
    Nissar, Nabil
    Naja, Najib
    Jamali, Abdellah
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [43] Mobile ad-hoc networks for large in-building environments
    Villanueva, FJ
    de la Morena, J
    Barba, J
    Moya, F
    López, JC
    2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 814 - 819
  • [44] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Tameem Eissa
    Shukor Abd Razak
    Mohd Asri Ngadi
    Arabian Journal for Science and Engineering, 2012, 37 : 2179 - 2192
  • [45] Efficient authentication scheme for routing in mobile ad hoc networks
    Xu, SD
    Mu, Y
    Susilo, W
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 854 - 863
  • [46] Blockchain Based Vehicle Authentication Scheme for Vehicular Ad-hoc Networks
    Stephen, Steffie Maria
    Jaekel, Arunita
    2021 IEEE INTELLIGENT VEHICLES SYMPOSIUM WORKSHOPS (IV WORKSHOPS), 2021, : 1 - 6
  • [47] An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks
    Sarencheh, Amirreza
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 111 - 118
  • [48] Improving QoS Goodput in Hostile Mobile Ad-Hoc Environments
    Helweh-Hannan, Ayman
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 568 - +
  • [49] A self-organized authentication architecture in mobile ad-hoc networks
    Hahm, S
    Jung, Y
    Yi, S
    Song, Y
    Chong, E
    Lim, K
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 689 - 696
  • [50] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Eissa, Tameem
    Abd Razak, Shukor
    Ngadi, Mohd Asri
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2012, 37 (08) : 2179 - 2192