Browse > Article

A Study on Authentication ID using Identifier in Ad-hoc Network  

Moon, Jong-Sik (순천향대학교 컴퓨터학과)
Byeon, Sang-Gu (공주대학교 바이오정보학과)
Lee, Im-Yeong (순천향대학교 컴퓨터학부)
Publication Information
Abstract
The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.
Keywords
Ad-hoc; Authentication; Device; Identifier;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," 16th IEEE Security Foundations Workshop, pp.219-233, 2002.
2 Laurent Eschenauer and Virgil D.Gligor, "A key-Management Scheme for Distributed Sensor Networks," Conference on Computer and Communications Security, pp. 41-47, 2002.
3 Michael Steiner, Gene Tsudik, and Michael Waidner, "Diffie-Hellman key Distribution Extended to Group communication," Conference on Computer and Communications Security, pp.31-37, 1996.
4 Vijay Varadharajan, Rajan Shankaran, and Michael Hitchens, "Security for cluster based ad hoc networks," J. of Computer Communications, Vol.27, No.5, pp.488-501, 2005.
5 M. Bohio and A. Miri, "Efficient identity-based security schemes for a hoc network routing protocols," J. of Ad hoc networks, Vol.2, No.3, pp.309-317, 2004.   DOI   ScienceOn
6 Hung Yu chien and Ru-Yu Lin, "Improved ill-based security framework for ad hoc network," J. of Ad hoc networks, Vol.6, No.1, pp. 47-60, 2008.   DOI   ScienceOn
7 Jung-San Lee and Chin-Chen Chang, "Secure communications for cluster-based ad hoc networks using node identities," J. of Network and computer Applications, Vol.30, No.4, pp. 1377-1396, 2007.   DOI   ScienceOn
8 G.V.S. Raju and Rehan Akbani, "Mobile Ad Hoc Networks Security," International Engineering Consortium, Annual Review of Communications, Vol. 58, pp. 625-628, 2006.
9 Wang changda and Ju shiguang, "Multilevel security model for ad hoc networks," J. of Systems Engineering and Electronics, Vol.19, No.2, pp. 391-397, 2008.   DOI   ScienceOn
10 D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, 2001.