Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman, Jordan
关键词
Cryptography - Network security - Authentication;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
相关论文
共 50 条
  • [11] Authentication and Key Agreement Protocol for Ad Hoc Networks Based on the Internet of Things Paradigm
    Turkanovic, Muhamed
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 153 - +
  • [12] DAKAA: Double Authentication and Key Agreement Algorithm for securing Vehicular Ad hoc Networks
    Muthumeenakshi, R.
    Anu Monisha, A.
    Murugan, K.
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 99 - 104
  • [13] Key revocation for identity-based schemes in mobile ad hoc networks
    Hoeper, Katrin
    Gong, Guang
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 224 - 237
  • [14] A survey of authentication schemes for vehicular ad hoc networks
    Riley, Marshall
    Akkaya, Kemal
    Fong, Kenny
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1137 - 1152
  • [15] Distributed authentication and key agreement protocol for ad hoc network
    Mo, Yijun
    Wang, Fei
    Huang, BenXiong
    Xu, Shuhua
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2047 - +
  • [16] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111
  • [18] Key agreement protocol in ad-hoc networks
    Lang, WH
    Zhou, MT
    She, K
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 296 - 301
  • [19] Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Hasbullah, Iznan Husainy
    Manickam, Selvakumar
    IEEE SENSORS JOURNAL, 2021, 21 (02) : 2422 - 2433
  • [20] Preloaded key distribution schemes for ad hoc networks
    Ramkumar, M
    Memon, N
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 186 - 191