A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network

被引:0
|
作者
Dey, Haimabati [1 ]
Datta, Raja [1 ]
机构
[1] Indian Inst Technol, Dept Elect & ECE, Kharagpur 721302, W Bengal, India
关键词
MANET; security; threshold cryptography; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.
引用
收藏
页码:400 / 409
页数:10
相关论文
共 50 条
  • [41] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [42] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Chen, Zhiya
    Zhou, Kunlin
    Liao, Qin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (01) : 40 - 57
  • [43] Forming Trust in Mobile Ad-Hoc Network
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    Manan, Jamalul-lail Abdul
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 470 - +
  • [44] Message authentication scheme for mobile ad hoc networks
    Sato, F
    Takahira, H
    Mizuno, T
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 50 - 56
  • [45] An Efficient Successive Authentication Scheme for Vehicular Ad-hoc Networks
    Saha, Sanjay
    Elahi, Md. Mamun
    Islam, Md. Mahfuzul
    Ahmed, Shabbir
    2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [46] Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
    Zhiya Chen
    Kunlin Zhou
    Qin Liao
    International Journal of Theoretical Physics, 2019, 58 : 40 - 57
  • [47] Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks
    Kim, Zeen
    Yim, Junhyun
    Kim, Jangseong
    Kim, Kwangjo
    Shon, Taeshik
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 250 - 255
  • [48] Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments
    Lee, Cheol-Seung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 135 - 146
  • [49] Simulation framework for Mobile Ad-Hoc network
    Sha, XJ
    Tan, W
    Xu, YB
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 739 - 743
  • [50] Mobile Ad-hoc Network Management in the Cloud
    Alshareef, Hazzaa Naif
    Grigoras, Dan
    2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2014, : 140 - 147