Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure

被引:0
|
作者
Nesteruk, Sergey [1 ]
Bezzateev, Sergey [1 ]
机构
[1] St Petersburg State Univ Aerosp Instrumentat, St Petersburg, Russia
基金
芬兰科学院;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider security issues arising in the development of the wireless networks without infrastructure, with the rapidly changing composition of the elements of such a network The LEAP Initial Protection (LEAP-IP) protocol proposed, which closes the vulnerability of the LEAP at the network initialization stage. Advanced LEAP-IP protocol allows to resist attacks on the radio channel, physical attacks on the device, and is energy efficient, that is especially important for devices with a limited power resource. Also, a classification of self organizing networks and some variants of using the proposed pairwise authentication protocol is presented.
引用
收藏
页码:190 / 197
页数:8
相关论文
共 50 条
  • [41] Privacy-preserving Location-based Service based on Deniable Authentication
    Zeng, Shengke
    Tan, Shuangquan
    Chen, Yong
    He, Mingxing
    Xia, Meichen
    Li, Xiao
    2016 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2016, : 276 - 281
  • [42] LTM-MAC: a Location-based TDMA MAC Protocol for Mobile Underwater Networks
    Mao, Jia
    Chen, Shumin
    Yu, Juntao
    Gu, Yifan
    Yu, Rui
    Xu, Yuanxin
    OCEANS 2016 - SHANGHAI, 2016,
  • [43] A Novel Location-Based Content Distribution Protocol for Vehicular Named-Data Networks
    Coutinho, Rodolfo W. L.
    Boukerche, Azzedine
    Yu, Xiangshen
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 1012 - 1017
  • [44] Efficient deniable authentication and its application in location-based services
    Ahene, Emmanuel
    Walker, Joojo
    Ali, Ikram
    Peasah, Kwame Ofosuhene
    Asante, Michael
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [45] An Authentication Approach for Multiple-User Location-Based Queries
    Wang, Yong
    Hassan, Abdelrhman
    Duan, Xiaoran
    Yang, Xiaodong
    Zhang, Yiquan
    Zhang, Xiaosong
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 256 - 270
  • [46] Trust-enhanced Security in Location-based Adaptive Authentication
    Lenzini, Gabriele
    Bargh, Mortaza S.
    Hulsebosch, Bob
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 105 - 119
  • [47] Easy Attendance: Location-based authentication for students integrated with Moodle
    Bucicoiu, Mihai
    Tapus, Nicolae
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [48] Effectively Collecting Data for the Location-Based Authentication in Internet of Things
    Kawamoto, Yuichi
    Nishiyama, Hiroki
    Kato, Nei
    Shimizu, Yoshitaka
    Takahara, Atsushi
    Jiang, Tingting
    IEEE SYSTEMS JOURNAL, 2017, 11 (03): : 1403 - 1411
  • [49] Behavior-based location recommendation on location-based social networks
    Rahimi, Seyyed Mohammadreza
    Far, Behrouz
    Wang, Xin
    GEOINFORMATICA, 2020, 24 (03) : 477 - 504
  • [50] Behavior-Based Location Recommendation on Location-Based Social Networks
    Rahimi, Seyyed Mohammadreza
    Wang, Xin
    Far, Behrouz
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2017, PT II, 2017, 10235 : 273 - 285