Secure mutual authentication for ad hoc wireless networks

被引:1
|
作者
Kim, BG
Hong, SS
机构
[1] Soongsil Univ, Sch Comp, Seoul 156743, South Korea
[2] Soongsil Univ, Venture Ctr, MAGI Inc, Seoul 156743, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2005年 / 33卷 / 1-2期
关键词
authentication; ad hoc wireless network;
D O I
10.1007/s11227-005-0225-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As wireless LANs and wireless terminals deployed, Security and authentication, among other things, became important. We propose a mutual authentication scheme for access security among wireless terminals. We use user identification together with hardware identification in creating a certificate for the wireless access. And authentication is performed based on the certificate. It enables reliable user authentication, establishment and check of access rights (when a terminal is managed in connection with a network gateway), Peer-to-Peer access with authentication, and international roaming of terminals.
引用
收藏
页码:123 / 132
页数:10
相关论文
共 50 条
  • [31] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks
    Mehdi Boulaiche
    [J]. Wireless Personal Communications, 2020, 114 : 483 - 517
  • [32] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks
    Boulaiche, Mehdi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 483 - 517
  • [33] A secure VLAN construction protocol in wireless ad hoc networks
    Wang, TI
    Yeh, CH
    Huang, YM
    [J]. ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 68 - 72
  • [34] A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
    Lacuesta, Raquel
    Lloret, Jaime
    Garcia, Miguel
    Penalver, Lourdes
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (04) : 629 - 641
  • [35] Secure Routing Protocol base on secure path in ad hoc wireless networks
    Al Otaibi, Saud
    Siewe, Francois
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 46 - 53
  • [36] Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree
    Shim, Kyung-Ah
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (11) : 5386 - 5393
  • [37] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    [J]. 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [38] Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Hasbullah, Iznan Husainy
    Manickam, Selvakumar
    Hanshi, Sabri M.
    [J]. IEEE ACCESS, 2020, 8 : 144957 - 144968
  • [39] QoS-based authentication scheme for ad hoc wireless networks
    Muppala, P
    Thomas, J
    Abraham, A
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 651 - 656
  • [40] Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks
    Ren, Yonglin
    Boukerche, Azzedine
    Pazzi, Richard Werner Nelem
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,