Efficient authentication scheme for routing in mobile ad hoc networks

被引:0
作者
Xu, SD [1 ]
Mu, Y [1 ]
Susilo, W [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Wollongong, NSW 2500, Australia
来源
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS | 2005年 / 3823卷
关键词
authentication; digital signature; MANET; routing; AODV;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security deployment in mobile ad hoc networks is frequently hampered by resource constraints. The current routing systems of mobile ad hoc networks deploy very weak security techniques in order to copy with the computational overhead and bandwidth consumption. In this paper, we present an ID-based online/offline signature scheme which provides a full scale of security with sound performance. We show that our scheme is secure against existential forgery under adaptive chosen message attacks.
引用
收藏
页码:854 / 863
页数:10
相关论文
共 11 条
[1]  
[Anonymous], 2003, AD HOC DEMAND DISTAN
[2]  
[Anonymous], P 8 ACM INT C MOB CO
[3]  
Bellare M., 1993, CCS 1993 P 1 ACM C C
[4]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[5]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[6]  
EVEN S, 1990, P ADV CRYPT CRYPT 89
[7]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[8]  
JOHNSON DB, 2004, DYNAMIC SOURCE ROUTI
[9]   Security arguments for digital signatures and blind signatures [J].
Pointcheval, D ;
Stern, J .
JOURNAL OF CRYPTOLOGY, 2000, 13 (03) :361-396
[10]  
ZAPATA MG, 2004, SECURE AD HOC DEMAND