A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network

被引:0
|
作者
Dey, Haimabati [1 ]
Datta, Raja [1 ]
机构
[1] Indian Inst Technol, Dept Elect & ECE, Kharagpur 721302, W Bengal, India
关键词
MANET; security; threshold cryptography; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.
引用
收藏
页码:400 / 409
页数:10
相关论文
共 50 条
  • [1] Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing
    Vijay, Sandip
    Sharma, Subhash C.
    CONTEMPORARY COMPUTING, PROCEEDINGS, 2009, 40 : 327 - 335
  • [2] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [3] Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
    Lee, Hyewon K.
    Choi, Jaeyoung
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 653 - 661
  • [4] Trust based multipath authentication protocol for mobile ad-hoc network
    Vinoth Kumar, K.
    Bhavani, S.
    Journal of Computational and Theoretical Nanoscience, 2015, 12 (12) : 5479 - 5485
  • [5] Certificate less Threshold Signature for Data Report Authentication in Mobile Ad-Hoc Network
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 143 - 150
  • [6] Distributed Trust Based authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network
    Sivagurunathan, S.
    Mohan, V.
    Subathra, P.
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (02) : 1 - 18
  • [7] Mobile Ad-hoc Network Key Management with Certificateless Cryptography
    Zhang, Zhenfei
    Susilo, Willy
    Raad, Raad
    ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 575 - +
  • [8] An effective authentication scheme in mobile ad hoc network
    Shin, Kiho
    Kim, Yoonho
    Kim, Yanggon
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 249 - +
  • [9] An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing
    Dimitrios D. Vergados
    Giannis Stergiou
    Wireless Personal Communications, 2007, 43 : 1767 - 1780
  • [10] An authentication scheme for Ad-hoc networks using threshold secret sharing
    Vergados, Dirnitrios D.
    Stergiou, Giannis
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 43 (04) : 1767 - 1780