Improved Cross Authentication Model Based on Threshold Method in Wireless Network

被引:0
|
作者
Yang, Yatao [1 ,2 ]
Pan, Shaoming [3 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[3] Guangxi Univ Technol, Liuzhou, Peoples R China
关键词
Wireless network; Cross authentication; Threshold method;
D O I
10.1080/15501320802575013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel cross authentication model is proposed based on (t, n) threshold method in Layered and Grouped Structure (LGS) wireless multi-hop network, the issues of cross authentication and secure communication between nodes in different trusted domains are settled. With no CA, new scheme of cross certificate being issued and validated is designed, by which, the node identification can be authenticated in different trusted domains.
引用
收藏
页码:86 / 86
页数:1
相关论文
共 50 条
  • [41] Universal Access Authentication for Wireless Network
    Liu, He
    Lian, Mangui
    An, Wenjuan
    2011 IET 4TH INTERNATIONAL CONFERENCE ON WIRELESS, MOBILE & MULTIMEDIA NETWORKS (ICWMMN 2011), 2011, : 350 - 355
  • [42] Authentication Method for Wireless Power Terminals Based on RF Fingerprint
    Zhao H.
    Sun J.
    Zhao S.
    Gaodianya Jishu/High Voltage Engineering, 2023, 49 (05): : 1810 - 1818
  • [43] Design of a password-based authentication method for wireless networks
    Manganaro, Andrea
    Koblensky, Mingyur
    Loreti, Michele
    WINSYS 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2007, : 9 - +
  • [44] Improved data fusion model for wireless sensor network
    Wang, Wei
    Huang, Tinglei
    Zhou, Youcai
    Liu, Hui
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2404 - 2406
  • [45] A Multilayer Improved RBM Network Based Image Compression Method in Wireless Sensor Networks
    Cheng, Chunling
    Wang, Shu
    Chen, Xingguo
    Yang, Yanying
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [46] Stability analysis of wireless network with improved fluid model
    Zhichao Zhou
    Yang Xiao
    Dong Wang
    Journal of Systems Engineering and Electronics, 2015, 26 (06) : 1149 - 1158
  • [47] Stability analysis of wireless network with improved fluid model
    Zhou, Zhichao
    Xiao, Yang
    Wang, Dong
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2015, 26 (06) : 1149 - 1158
  • [48] An Improved IoT Notion-Based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor Network
    Zhang, Yuxia
    Zhang, Xin
    Wen, Fengtong
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 50 - 62
  • [49] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111
  • [50] A secure cross-domain authentication scheme based on threshold signature for MEC
    Chen, Lei
    Guo, Chong
    Gong, Bei
    Waqas, Muhammad
    Deng, Lihua
    Qin, Haowen
    Journal of Cloud Computing, 2024, 13 (01)