Authentication protocol using an identifier in an ad hoc network environment

Authentication protocol using an identifier in an ad hoc network environment

0.00 Avg rating0 Votes
Article ID: iaor201111212
Volume: 55
Issue: 1-2
Start Page Number: 134
End Page Number: 141
Publication Date: Jan 2012
Journal: Mathematical and Computer Modelling
Authors: ,
Keywords: networks, security
Abstract:

This paper deals with device connections in a trust‐based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third‐party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol.

Reviews

Required fields are marked *. Your email address will not be published.