Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman, Jordan
关键词
Cryptography - Network security - Authentication;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
相关论文
共 50 条
  • [21] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853
  • [22] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    Computing, 2014, 96 : 843 - 853
  • [23] Short paper: Limitations of key escrow in identity-based schemes in ad hoc networks
    Hoeper, K
    Gong, G
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 403 - 405
  • [24] Group authentication and group key distribution for Ad hoc networks
    Wang, Feng
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    International Journal of Network Security, 2015, 17 (02) : 199 - 207
  • [25] Multicast key agreement protocol for mobile ad hoc networks
    Boumso, Andre
    Bensaber, Boucif Amar
    Biskri, Ismail
    Khali, Samir
    WINSYS 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2006, : 86 - 94
  • [26] An authenticated key agreement protocol for mobile ad hoc networks
    Zou, Xukai
    Thukral, Amandeep
    Ramamurthy, Byrav
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 509 - +
  • [27] An efficient group key agreement protocol for ad hoc networks
    Augot, D
    Bhaskar, R
    Issarny, V
    Sacchetti, D
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 576 - 580
  • [28] A Secure and Efficient Group Key Agreement for Ad hoc Networks
    Feng, Tao
    Wang, Yilin
    Ma, Jianfeng
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 540 - +
  • [29] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 180 - +
  • [30] Dynamic asymmetric group key agreement for ad hoc networks
    Zhao, Xingwen
    Zhang, Fangguo
    Tian, Haibo
    AD HOC NETWORKS, 2011, 9 (05) : 928 - 939