Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman, Jordan
关键词
Cryptography - Network security - Authentication;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
相关论文
共 50 条
  • [31] Fast group key agreement protocols in Ad Hoc networks
    School of Economics and Management, Xidian Univ., Xi'an 710071, China
    不详
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2007, 4 (659-663):
  • [32] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2509 - +
  • [33] A Novel Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Wang Yi
    Li Gui-Ling
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 509 - +
  • [34] Efficient Group Key Agreement & Recovery in Ad hoc Networks
    Komninos, Nikos
    Mantas, Georgios
    ICWMMN 08, PROCEEDINGS, 2008, : 25 - 28
  • [35] Identity Based Schemes for Securing Mobile Ad Hoc Networks
    Ghosh, Uttam
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2514 - 2517
  • [36] Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
    Ali, Ikram
    Hassan, Alzubair
    Li, Fagen
    VEHICULAR COMMUNICATIONS, 2019, 16 : 45 - 61
  • [37] Research on Key Management Schemes for Mobile Ad Hoc Networks
    Han Lei
    Liu Ji-qiang
    Han Zhen
    Wei Xue-ye
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 225 - +
  • [38] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Lunzhi Deng
    Jianxin Shao
    Zhenyu Hu
    Peer-to-Peer Networking and Applications, 2021, 14 : 2236 - 2247
  • [39] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Deng, Lunzhi
    Shao, Jianxin
    Hu, Zhenyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2236 - 2247
  • [40] An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication
    Priyadharshini, A.
    Dannana, Suresh
    Rajasekaran, Arun Sekar
    Maria, Azees
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (07):