Identity authentication and key agreement schemes for ad hoc networks

被引:0
作者
Al-Fayoumi, Mohammad A. [1 ]
Aboud, Sattar J. [1 ]
机构
[1] Department of Computer Information Science, Faculty of IT, The Middle East University for Graduate Studies, Amman
关键词
Ad hoc networks; Identity authentication; Identity certificate; Key agreement; Multi-hop; Shares key; Threshold group signature;
D O I
10.3923/jas.2007.1638.1642
中图分类号
学科分类号
摘要
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:1638 / 1642
页数:4
相关论文
共 50 条
  • [41] Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks
    Janani, V. S.
    Manikandan, M. S. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 6131 - 6150
  • [42] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [43] Multifold node authentication in mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (12) : 1391 - 1406
  • [44] Efficient cluster-based group key agreement protocols for wireless ad hoc networks
    Konstantinou, Elisavet
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 384 - 393
  • [45] GAKAP, multicast key agreement protocol for ad hoc networks based on group activity probability
    Boumso, A
    Bensaber, BA
    Biskri, I
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 700 - 704
  • [46] Provable security efficient clustering-based group key agreement for ad hoc networks
    Hao, Bin
    Yang, Yu
    Luo, Shoushan
    Yang, Yixian
    International Journal of Advancements in Computing Technology, 2012, 4 (07) : 317 - 328
  • [47] An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks
    Khan, Muhammad Asghar
    Ullah, Insaf
    Kumar, Neeraj
    Oubbati, Omar Sami
    Qureshi, Ijaz Mansoor
    Noor, Fazal
    Khanzada, Fahim Ullah
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) : 4839 - 4851
  • [48] Key Management for Large Ad Hoc Networks
    Gao, Fengxiu
    Li, Guangsong
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [49] Key Exchange for Securing Ad hoc Networks
    Taneja, Sunil
    Kush, Ashwani
    Hwang, C. Jinshong
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 933 - +
  • [50] MAC schemes for ad-hoc wireless networks
    Loscri, V.
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 36 - 40