Identity authentication and key agreement schemes for ad hoc networks

被引:0
|
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman
关键词
Ad hoc networks; Identity authentication; Identity certificate; Key agreement; Multi-hop; Shares key; Threshold group signature;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
页数:4
相关论文
共 50 条
  • [1] Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks
    Chen, Cheng-Yeh
    Hsu, Te-Cheng
    Wu, Hsin-Te
    Chiang, John Y.
    Hsieh, Wen-Shyong
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 893 - 902
  • [2] Authentication and Key Agreement Protocol for Ad Hoc Networks Based on the Internet of Things Paradigm
    Turkanovic, Muhamed
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 153 - +
  • [3] Key agreement in ad hoc networks
    Hwang, Ren-Junn
    Chang, Rong-Chi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2006, 2 (1-2) : 37 - 45
  • [4] Key agreement in ad hoc networks
    Asokan, N
    Ginzboorg, P
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1627 - 1637
  • [5] Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Odelu, Vanga
    Reddy, Alavalapati Goutham
    Parks, Kisung
    Parks, Youngho
    IEEE ACCESS, 2017, 5 : 14966 - 14980
  • [6] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [7] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [8] ID-Based key agreement with anonymity for ad hoc networks
    Chien, Hung-Yu
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 333 - 345
  • [9] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    Computing, 2014, 96 : 843 - 853
  • [10] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853