A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority
نویسندگان
چکیده
Australian Business Deans Council (ABDC); Bacon’s Media Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); CSA Illumina; DBLP; Gale Directory of Publications & Broadcast Media; GetCited; Google Scholar; INSPEC; JournalTOCs; Library & Information Science Abstracts (LISA); MediaFinder; Norwegian Social Science Data Services (NSD); SCOPUS; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Directory; Web of Science (All Journals); Web of Science Emerging Sources Citation Index (ESCI) Special Issue Cyber Security and Privacy in Communication Networks (Part 2)
منابع مشابه
An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks
In Mobile Ad-hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. Our previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. As an extension to our previous work, in this paper, we propose to develop an enhanced distributed certificate au...
متن کاملBilinear Pairings-Based Threshold Identity Authentication Scheme For Ad Hoc Network
Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملAdvanced Secure Remote User Authentication Scheme Preserving User Anonymity
To ensure secure transmission of data and to authenticate remote user while accessing server resources, smart card based remote user authentication schemes have been widely adopted. In 2004, Das et al proposed first of its kind of protocol for remote user authentication with smart cards using Dynamic Id to protect user anonymity. In 2005, Chien et al pointed out that Das et al scheme failed to ...
متن کاملRegion Authority (RA) Collaborated Certificate Organization and Management in VANET
Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJISP
دوره 11 شماره
صفحات -
تاریخ انتشار 2017