Detailed Information

Cited 0 time in webofscience Cited 5 time in scopus
Metadata Downloads

Authentication protocol using an identifier in an ad hoc network environment

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Jong Sik-
dc.contributor.authorLee, Im-Yeong-
dc.date.accessioned2021-08-12T03:46:23Z-
dc.date.available2021-08-12T03:46:23Z-
dc.date.issued2012-01-
dc.identifier.issn0895-7177-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/15482-
dc.description.abstractThis paper deals with device connections in a trust-based ad hoc network. Because a temporary device frequently joins or leaves a network, the authentication and security technology should be prepared for the malicious devices used in third-party attacks. An authentication scheme with the existing certification and ID, and security technology using symmetric and public keys are used. Therefore, in this paper we propose using two devices that have not shared information for mutual generation of authentication ID. The use of an authentication ID can establish mutual trust and provide security and efficiency for communication and generation of a symmetric key. Our analysis results show that an authentication operation reduction of up to 57%, compared to related work, is achieved by our protocol. (C) 2011 Elsevier Ltd. All rights reserved.-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherPergamon Press Ltd.-
dc.titleAuthentication protocol using an identifier in an ad hoc network environment-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1016/j.mcm.2011.02.007-
dc.identifier.scopusid2-s2.0-82755187349-
dc.identifier.wosid000296919500016-
dc.identifier.bibliographicCitationMathematical and Computer Modelling, v.55, no.1-2, pp 134 - 141-
dc.citation.titleMathematical and Computer Modelling-
dc.citation.volume55-
dc.citation.number1-2-
dc.citation.startPage134-
dc.citation.endPage141-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordAuthorAd hoc network-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorIdentifier-
dc.subject.keywordAuthorKey generation-
dc.subject.keywordAuthorMulti-party-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Software Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE