Improved Cross Authentication Model Based on Threshold Method in Wireless Network

被引:0
|
作者
Yang, Yatao [1 ,2 ]
Pan, Shaoming [3 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[3] Guangxi Univ Technol, Liuzhou, Peoples R China
关键词
Wireless network; Cross authentication; Threshold method;
D O I
10.1080/15501320802575013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel cross authentication model is proposed based on (t, n) threshold method in Layered and Grouped Structure (LGS) wireless multi-hop network, the issues of cross authentication and secure communication between nodes in different trusted domains are settled. With no CA, new scheme of cross certificate being issued and validated is designed, by which, the node identification can be authenticated in different trusted domains.
引用
收藏
页码:86 / 86
页数:1
相关论文
共 50 条
  • [21] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [22] An improved wireless network based on neural network algorithm
    Jiang, Yang
    Liu, Wei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 4044 - 4046
  • [23] Wireless sensor network routing method based on improved ant colony algorithm
    Zou, Zongfeng
    Qian, Ying
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (03) : 991 - 998
  • [24] A wireless sensor network node redeployment method based on improved leapfrog algorithm
    Zhang, Bin
    Wang, Xinhua
    International Journal of Information and Communication Technology, 2024, 24 (01) : 33 - 47
  • [25] An Improved Resource Allocation Method Based on Convex Optimization in Centralized Wireless Network
    Zhao, Junhui
    Chen, Ximei
    Luo, Junyou
    Wang, Dongming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 62 - +
  • [26] Comprehensive Evaluation Method for Wireless Network Optimization Scheme Based on Improved TOPSIS
    Ye Pengz
    Zhuang Junbo
    Zhou Qiang
    Wang Xi
    Chen Wenbin
    Zhou Xing
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 728 - 733
  • [27] Wireless sensor network routing method based on improved ant colony algorithm
    Zongfeng Zou
    Ying Qian
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 991 - 998
  • [28] Modeling of Wireless Network Security Authentication Protocol Based on SPIN
    Zhou Li
    Tan Fang-yong
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1892 - 1897
  • [29] Research on Music Multiterminal Audio Authentication Based on Wireless Network
    Li, Dongmei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [30] A Clusters Algorithm Based on the Threshold for Wireless Sensor Network
    Ming-hua, Liao
    Hua, Zhang
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 1065 - 1071