Authentication protocol using an identifier in an ad hoc network environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moon, Jong Sik | - |
dc.contributor.author | Lee, Im-Yeong | - |
dc.date.accessioned | 2021-08-12T03:46:23Z | - |
dc.date.available | 2021-08-12T03:46:23Z | - |
dc.date.issued | 2012-01 | - |
dc.identifier.issn | 0895-7177 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/15482 | - |
dc.description.abstract | This paper deals with device connections in a trust-based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third-party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol. (C) 2011 Elsevier Ltd. All rights reserved. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Pergamon Press Ltd. | - |
dc.title | Authentication protocol using an identifier in an ad hoc network environment | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1016/j.mcm.2011.02.007 | - |
dc.identifier.scopusid | 2-s2.0-82755187349 | - |
dc.identifier.wosid | 000296919500016 | - |
dc.identifier.bibliographicCitation | Mathematical and Computer Modelling, v.55, no.1-2, pp 134 - 141 | - |
dc.citation.title | Mathematical and Computer Modelling | - |
dc.citation.volume | 55 | - |
dc.citation.number | 1-2 | - |
dc.citation.startPage | 134 | - |
dc.citation.endPage | 141 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordAuthor | Ad hoc network | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Identifier | - |
dc.subject.keywordAuthor | Key generation | - |
dc.subject.keywordAuthor | Multi-party | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.