Improved Cross Authentication Model Based on Threshold Method in Wireless Network

被引:0
|
作者
Yang, Yatao [1 ,2 ]
Pan, Shaoming [3 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[3] Guangxi Univ Technol, Liuzhou, Peoples R China
关键词
Wireless network; Cross authentication; Threshold method;
D O I
10.1080/15501320802575013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel cross authentication model is proposed based on (t, n) threshold method in Layered and Grouped Structure (LGS) wireless multi-hop network, the issues of cross authentication and secure communication between nodes in different trusted domains are settled. With no CA, new scheme of cross certificate being issued and validated is designed, by which, the node identification can be authenticated in different trusted domains.
引用
收藏
页码:86 / 86
页数:1
相关论文
共 50 条
  • [1] Cross authentication model based on threshold method
    Yang Ya-tao
    Pan Shao-ming
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 495 - 498
  • [2] A New Wireless Mesh Network Authentication Scheme Based on Threshold Method
    Yang, Yatao
    Gu, Yonghao
    Tan, Xi
    Ma, Lina
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2260 - 2265
  • [3] The Authentication Method In Wireless Sensor Network Based On Trust Model
    Voitovych, Olesia
    Kupershtein, Leonid
    Shulyatitska, Olga
    Malyushytskyy, Viktor
    2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), 2017, : 993 - 997
  • [4] A Wireless Mesh Network Authentication Method based on Identity Based Signature
    Liu Wenju
    Shang Yuzhen
    Wang Ze
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
  • [5] An improved authentication method towards wireless mesh m-commerce network
    Liu, Dongsheng
    Ju, Chunhua
    Chen, Wei
    Zhou, Guanglan
    Journal of Information and Computational Science, 2010, 7 (01): : 177 - 183
  • [6] An Authentication Model for Wireless Network Services
    Huy Hoang Ngo
    Wu, Xianping
    Phu Dung Le
    Srinivasan, Bala
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 996 - 1003
  • [7] A Multi-element Authentication Method Based on ECDSA for Wireless Network
    Long Zhaohua
    Wang Guofeng
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 47 - 49
  • [8] An insider user authentication method based on improved temporal convolutional network
    Tao, Xiaoling
    Yu, Yuelin
    Fu, Lianyou
    Liu, Jianxiang
    Zhang, Yunhao
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [9] A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
    Li, Min
    Lv, Xin
    Song, Wei
    Zhou, Wenhuan
    Qi, Rongzhi
    Su, Huaizhi
    PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014), 2014, : 190 - 194
  • [10] A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT
    Ngo, Huy Hoang
    Wu, Xianping
    Le, Phu Dung
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 182 - +