Detailed Information

Cited 0 time in webofscience Cited 5 time in scopus
Metadata Downloads

Authentication protocol using an identifier in an ad hoc network environment

Authors
Moon, Jong SikLee, Im-Yeong
Issue Date
Jan-2012
Publisher
Pergamon Press Ltd.
Keywords
Ad hoc network; Authentication; Identifier; Key generation; Multi-party
Citation
Mathematical and Computer Modelling, v.55, no.1-2, pp 134 - 141
Pages
8
Journal Title
Mathematical and Computer Modelling
Volume
55
Number
1-2
Start Page
134
End Page
141
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/15482
DOI
10.1016/j.mcm.2011.02.007
ISSN
0895-7177
Abstract
This paper deals with device connections in a trust-based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third-party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol. (C) 2011 Elsevier Ltd. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Software Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE