Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman, Jordan
关键词
Cryptography - Network security - Authentication;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
相关论文
共 50 条
  • [1] Key agreement and identity authentication protocols for ad hoc networks
    Yao, J
    Zeng, GH
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 720 - 724
  • [2] Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks
    Chen, Cheng-Yeh
    Hsu, Te-Cheng
    Wu, Hsin-Te
    Chiang, John Y.
    Hsieh, Wen-Shyong
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 893 - 902
  • [3] Session key agreement scheme for Ad Hoc network based on identity authentication
    Shi, Rong-Hua
    Fan, Xiang-Yu
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (06): : 2236 - 2239
  • [4] A novel identity authentication and key agreement scheme for ad hoc network security
    Pi, Jian-yong
    Liu, Xin-song
    Wu, Ai
    Fu, Qing-yun
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 436 - +
  • [5] Key agreement in ad hoc networks
    Hwang, RJ
    Chang, RC
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2003, 2745 : 382 - 390
  • [6] Key agreement in ad hoc networks
    Hwang, Ren-Junn
    Chang, Rong-Chi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2006, 2 (1-2) : 37 - 45
  • [7] Key agreement in ad hoc networks
    Asokan, N
    Ginzboorg, P
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1627 - 1637
  • [8] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [9] Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Odelu, Vanga
    Reddy, Alavalapati Goutham
    Parks, Kisung
    Parks, Youngho
    IEEE ACCESS, 2017, 5 : 14966 - 14980
  • [10] Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
    Sun, Mei
    Guo, Yuyan
    Zhang, Dongbing
    Jiang, MingMing
    COMPLEXITY, 2021, 2021