Identity Authentication and Key Agreement Schemes for Ad Hoc Networks

نویسندگان

  • Mohammad A AL-Fayoumi
  • Sattar J Aboud
چکیده

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined, and is claimed to be more efficient than the existing schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-based Key Exchange Protocols for Ad Hoc Networks

In this work we present a set of authentication and key exchange protocols that use identity-based pre-shared keys from pairings. We show that those protocols are attractive for an implementation in ad hoc networks. We start with introducing a light-weight protocol that uses purely symmetric crypto primitives. We then gradually add more security features. We analyze the security and performance...

متن کامل

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation

In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of ...

متن کامل

Identity Based Encryption Using Multiple Trust Authorities in Ad Hoc Networks

Ad hoc networks are becoming more and more popular as the use of mobile computing devices increases. While ad hoc networks have many advantageous properties, they also pose several security challenges which are unique to networks of this kind. One of the main challenges that ad hoc networks have to face is authentication. Authentication is difficult to achieve in ad hoc networks because some ty...

متن کامل

TLPKA: Pairwise Key Agreement Based on the Geometrical Property of the Tangent Line in Ad Hoc Network Systems

In this paper, we propose a new pairwise key agreement, TLPKA (Tangent Line Pairwise Key Agreement), for establishing a secure link between members in an ad hoc network. With pairwise keys, data transmitted in ad hoc networks can be protected from the eavesdropping of outsiders. These pairwise keys can also be used to authenticate members in ad hoc networks. In addition, due to the property of ...

متن کامل

An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks

The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014