A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority

نویسندگان

  • Sarvesh Tanwar
  • Anil Kumar
چکیده

Australian Business Deans Council (ABDC); Bacon’s Media Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); CSA Illumina; DBLP; Gale Directory of Publications & Broadcast Media; GetCited; Google Scholar; INSPEC; JournalTOCs; Library & Information Science Abstracts (LISA); MediaFinder; Norwegian Social Science Data Services (NSD); SCOPUS; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Directory; Web of Science (All Journals); Web of Science Emerging Sources Citation Index (ESCI) Special Issue Cyber Security and Privacy in Communication Networks (Part 2)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks

In Mobile Ad-hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. Our previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. As an extension to our previous work, in this paper, we propose to develop an enhanced distributed certificate au...

متن کامل

Bilinear Pairings-Based Threshold Identity Authentication Scheme For Ad Hoc Network

Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

Advanced Secure Remote User Authentication Scheme Preserving User Anonymity

To ensure secure transmission of data and to authenticate remote user while accessing server resources, smart card based remote user authentication schemes have been widely adopted. In 2004, Das et al proposed first of its kind of protocol for remote user authentication with smart cards using Dynamic Id to protect user anonymity. In 2005, Chien et al pointed out that Das et al scheme failed to ...

متن کامل

Region Authority (RA) Collaborated Certificate Organization and Management in VANET

Vehicular ad hoc networks (VANETs) are receiving increasing attention from academics due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables lifecritical applications, such as the alerting functionality during medical emergencies, and thus, plays a key role in VANET applications. In a VANET, vehicles rely on the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJISP

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2017