Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman, Jordan
关键词
Cryptography - Network security - Authentication;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
相关论文
共 50 条
  • [41] Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks
    Wan, Zhiguo
    Zhu, Bo
    Deng, Robert H.
    Bao, Feng
    Ananda, Akkihebbal L.
    2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 652 - 658
  • [42] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Chen, Zhiya
    Zhou, Kunlin
    Liao, Qin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (01) : 40 - 57
  • [43] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Zhiya Chen
    Kunlin Zhou
    Qin Liao
    International Journal of Theoretical Physics, 2019, 58 : 40 - 57
  • [44] Comments on two schemes of identity-based user authentication and key agreement for mobile client–server networks
    Run-hua Shi
    Hong Zhong
    Shun Zhang
    The Journal of Supercomputing, 2015, 71 : 4015 - 4018
  • [45] Novel key management and authentication scheme for ad hoc space networks
    College of Automation, Northwestern Polytechnical University, Xi'an 710072, China
    Tongxin Xuebao, 2006, 8 (104-107+112):
  • [46] Efficient hybrid key agreement protocol for wireless ad hoc networks
    Li, XY
    Wang, Y
    Frieder, O
    ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 404 - 409
  • [47] An Efficient Group Key Agreement Protocol for Ad-Hoc Networks
    Rahman, Rony Hasinur
    Rahman, M. Lutfar
    PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 478 - 483
  • [48] A communication-efficient key agreement protocol in Ad hoc Networks
    Shi, HS
    He, MX
    2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 285 - 291
  • [49] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [50] ID-Based key agreement with anonymity for ad hoc networks
    Chien, Hung-Yu
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 333 - 345