Identity authentication and key agreement schemes for ad hoc networks

被引:0
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman
关键词
Ad hoc networks; Identity authentication; Identity certificate; Key agreement; Multi-hop; Shares key; Threshold group signature;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
页数:4
相关论文
共 50 条
  • [31] A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    Turkanovic, Muhamed
    Brumen, Bostjan
    Hoelbl, Marko
    AD HOC NETWORKS, 2014, 20 : 96 - 112
  • [32] Constant-round contributory group key agreement for ad hoc networks
    Zhang, P
    Ye, CQ
    Li, X
    Cheng, YH
    Ma, XY
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1199 - 1202
  • [33] A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
    Buettner, Carsten
    Huss, Sorin A.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 259 - 269
  • [34] A Lightweight Authentication and Key Agreement Schemes for IoT Environments
    Lee, Dae-Hwi
    Lee, Im-Yeong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [35] An authenticated clustering-based group key agreement for large ad hoc networks
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China
    不详
    Adv. Inf. Sci. Serv. Sci., 2012, 7 (281-291): : 281 - 291
  • [36] Provably Secure Cluster-based Group Key Agreement for Ad hoc Networks
    Zhou, Fucai
    Li, Hui
    Xu, Jian
    Yu, Bing
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 228 - 234
  • [37] A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
    Hietalahti, Maarit
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (02) : 43 - 53
  • [38] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [39] Designing Anonymous Key Agreement Scheme for Secure Vehicular Ad-Hoc Networks
    Ismail, Md.
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    Kumari, Saru
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (09) : 11382 - 11396
  • [40] Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks
    V. S. Janani
    M. S. K. Manikandan
    Wireless Personal Communications, 2017, 97 : 6131 - 6150