A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network

被引:0
|
作者
Dey, Haimabati [1 ]
Datta, Raja [1 ]
机构
[1] Indian Inst Technol, Dept Elect & ECE, Kharagpur 721302, W Bengal, India
关键词
MANET; security; threshold cryptography; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.
引用
收藏
页码:400 / 409
页数:10
相关论文
共 50 条
  • [31] A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network
    Yang, Yuhan
    Wei, Lijun
    Wu, Jing
    Long, Chengnian
    Li, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8078 - 8090
  • [32] Blockchain Based Efficient Pairing-Free Certificateless Authentication Scheme for Vehicular Ad-hoc Network
    Yu, Meiju
    Sa, Rula
    Zhang, Jin
    Zhao, Yi
    An, Qi
    Gao, Qiaomei
    SERVICE-ORIENTED COMPUTING, ICSOC 2024, PT II, 2025, 15405 : 314 - 322
  • [33] Design of Service Discovery Scheme based on Connection Degree in Mobile Ad-hoc Network Environments
    Kim, Gu Su
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 154 - 158
  • [34] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks
    Hamad, A. M.
    Khedr, W. I.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
  • [35] FrameGeoSocial Mobile Ad-hoc Social Network Based on Geolocation
    Ramos, Thales M.
    Moura Maristela Holanda, Mateus B. Damasceno e Breno R.
    Araujo, Aleteia
    2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
  • [36] A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    Chen, Huifang
    Ge, Linlin
    Xie, Lei
    SENSORS, 2015, 15 (07) : 17057 - 17075
  • [37] An ant system based multicasting in mobile ad-hoc network
    Lee, SY
    Chang, HS
    2005 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-3, PROCEEDINGS, 2005, : 1583 - 1588
  • [38] Control Scheme for Flooding Operation of Reactive Routing in Mobile Ad-hoc Network
    Sharma, Abhilasha
    Deora, M. S.
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [39] Energy Efficient Clustering for Certificate Revocation Scheme in Mobile Ad-Hoc Network
    K. Rajkumar
    M. K. Jeyakumar
    Wireless Personal Communications, 2021, 118 : 647 - 662
  • [40] Energy Efficient Clustering for Certificate Revocation Scheme in Mobile Ad-Hoc Network
    Rajkumar, K.
    Jeyakumar, M. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (01) : 647 - 662