Article ID: | iaor201111212 |
Volume: | 55 |
Issue: | 1-2 |
Start Page Number: | 134 |
End Page Number: | 141 |
Publication Date: | Jan 2012 |
Journal: | Mathematical and Computer Modelling |
Authors: | Moon Jong Sik, Lee Im-Yeong |
Keywords: | networks, security |
This paper deals with device connections in a trust‐based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third‐party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol.