Back to Search Start Over

Authentication protocol using an identifier in an ad hoc network environment

Authors :
Moon, Jong Sik
Lee, Im-Yeong
Source :
Mathematical & Computer Modelling. Jan2012, Vol. 55 Issue 1/2, p134-141. 8p.
Publication Year :
2012

Abstract

Abstract: This paper deals with device connections in a trust-based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third-party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
08957177
Volume :
55
Issue :
1/2
Database :
Academic Search Index
Journal :
Mathematical & Computer Modelling
Publication Type :
Academic Journal
Accession number :
67248448
Full Text :
https://doi.org/10.1016/j.mcm.2011.02.007