Distributed authentication and key agreement protocol for ad hoc network

被引:1
|
作者
Mo, Yijun [1 ]
Wang, Fei [1 ]
Huang, BenXiong [1 ]
Xu, Shuhua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Elect & Informat, Wuhan, Peoples R China
关键词
trusted-computing based distributed virtual security zone model (TC-DVSZ); distributed authority (DA); ecliptic curve cryptology (ECC);
D O I
10.1109/ICACT.2007.358775
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Ad hoc network has developed rapidly due to its self-organization and stability, but its openness and mobility brings some problems in security. We present a trusted-computing based distributed virtual security zone (TC-DVSZ) model to ensure the security in Ad hoc network with less computation and bandwidth. In the model, distributed authority (DA) has been introduced into the network to act as a CA in each cluster. To keep the DA trusted and reliable, we propose a trust based DA decision arithmetic. At the same time, we use ECC instead of RSA, and provide two level key agreement scheme, that decreases the cost of computation and increases the adaptability to various nodes with different computation capability. Finally, we prove that TC-DVSZ model is much more suitable for ad hoc network, because the model reduces the requirements for bandwidth, computation capacity, and storage..
引用
收藏
页码:2047 / +
页数:2
相关论文
共 50 条
  • [1] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [2] Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Odelu, Vanga
    Reddy, Alavalapati Goutham
    Parks, Kisung
    Parks, Youngho
    IEEE ACCESS, 2017, 5 : 14966 - 14980
  • [3] A novel identity authentication and key agreement scheme for ad hoc network security
    Pi, Jian-yong
    Liu, Xin-song
    Wu, Ai
    Fu, Qing-yun
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 436 - +
  • [4] Session key agreement scheme for Ad Hoc network based on identity authentication
    Shi, Rong-Hua
    Fan, Xiang-Yu
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (06): : 2236 - 2239
  • [5] Efficient Distributed Group Authentication Protocol for Vehicular Ad Hoc Network
    Karunanithi, Priya
    Karuppanan, Komathy
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 624 - 633
  • [6] Group key agreement protocol based on grouping in Ad Hoc network
    Xue R.
    Lu W.
    Zhang Q.
    Advances in Information Sciences and Service Sciences, 2011, 3 (11): : 365 - 373
  • [7] Authentication and Key Agreement Protocol for Ad Hoc Networks Based on the Internet of Things Paradigm
    Turkanovic, Muhamed
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 153 - +
  • [8] An Improved IoT Notion-Based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor Network
    Zhang, Yuxia
    Zhang, Xin
    Wen, Fengtong
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 50 - 62
  • [9] Secure and efficient dynamic group key agreement protocol for an ad hoc network
    Gangwar, Rakesh Chandra
    Sarje, Anil K.
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 54 - 59
  • [10] Making the key agreement protocol in mobile ad hoc network more efficient
    Yao, G
    Ren, K
    Bao, F
    Deng, RH
    Feng, DG
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 343 - 356