A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network

被引:0
|
作者
Dey, Haimabati [1 ]
Datta, Raja [1 ]
机构
[1] Indian Inst Technol, Dept Elect & ECE, Kharagpur 721302, W Bengal, India
关键词
MANET; security; threshold cryptography; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.
引用
收藏
页码:400 / 409
页数:10
相关论文
共 50 条
  • [21] On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
    Yap, Wun-She
    Liu, Joseph K.
    Tan, Syh-Yuan
    Goi, Bok-Min
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3094 - 3098
  • [22] Reliable mobile ad-hoc network
    Dana, Arash
    Zadeh, Ahmad Khadem
    Nasiri, Saeid Haji
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 371 - +
  • [23] A scalable mobility-based replica allocation scheme in a mobile ad-hoc network
    Kim, Sun-Kyum
    Yoon, Ji-Hyeun
    Lee, Kwang-Jo
    Choi, Jae-Ho
    Yang, Sung-Bong
    TELECOMMUNICATION SYSTEMS, 2015, 60 (02) : 239 - 250
  • [24] A scalable mobility-based replica allocation scheme in a mobile ad-hoc network
    Sun-Kyum Kim
    Ji-Hyeun Yoon
    Kwang-Jo Lee
    Jae-Ho Choi
    Sung-Bong Yang
    Telecommunication Systems, 2015, 60 : 239 - 250
  • [25] Lightweight Authentication-based Scheme for AODV in Ad-hoc Networks
    Nissar, Nabil
    Naja, Najib
    Jamali, Abdellah
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [26] Blockchain Based Vehicle Authentication Scheme for Vehicular Ad-hoc Networks
    Stephen, Steffie Maria
    Jaekel, Arunita
    2021 IEEE INTELLIGENT VEHICLES SYMPOSIUM WORKSHOPS (IV WORKSHOPS), 2021, : 1 - 6
  • [27] A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
    Zhao, Shushan
    Aggarwal, Akshai
    Frost, Richard
    Bai, Xiaole
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 380 - 400
  • [28] Multilevel Authentication for Vehicular Ad-Hoc Networks with Cryptography Hash Functions
    Malathi, M.
    Divya, P. S.
    Anusha, M.
    Rajalakshmi, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 303 - 306
  • [29] An authentication scheme for a Jini-based ad hoc network
    McMahon, MM
    Datko, JB
    Needham, DM
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 462 - 467
  • [30] A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1090 - 1094