APEC - An Authentication Protocol with Embedded Certificates

被引:0
|
作者
Hiromoto, Robert E. [1 ]
机构
[1] Univ Idaho, Moscow, ID 83844 USA
关键词
Authentication; malicious attacks; space-time representation; time-slotted frequency-hopping spread spectrum;
D O I
10.1109/IDAACS.2009.5342892
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The APEC (Authentication Protocol with Embedded Certificates) is a wireless ad hoc network authentication protocol that employs a time-slots/frequency two-tuple for the validation of trusted nodes in a secure ad hoc network. APEC is derived from a canonical, time-space (frequency channel) splitting over which information (data packets) propagates under the constraint of a collision-avoidance protocol. In this paper, we analyze several authentication attack scenarios and discuss their properties under APEC.
引用
收藏
页码:665 / 668
页数:4
相关论文
共 50 条
  • [31] Secure Mutual Authentication and Key-Exchange Protocol Between PUF-Embedded IoT Endpoints
    Zheng, Yue
    Chang, Chip-Hong
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [32] Authentication protocol for TETRA with authentication algorithm running in HLR
    Li, H
    Yang, YX
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 403 - 406
  • [33] A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT
    Hamouid, Khaled
    Omar, Mawloud
    Adi, Kamel
    12TH WIRELESS DAYS CONFERENCE (WD 2021), 2020,
  • [34] Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network
    Babu, Erukala Suresh
    Srinivasarao, B. K. N.
    Kavati, Ilaiah
    Rao, Mekala Srinivasa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [35] New authentication concept using certificates for big data analytic tools
    Velthuis, Paul J. E.
    Schaefer, Marcel
    Steinebach, Martin
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [36] A risk-based authentication model for across-certificates in PKI
    Zhong YuanSheng
    Liu XiaoHua
    Huang Maojun
    Management of E-Commerce and E-Government, 2007, : 97 - 110
  • [37] Anonymous attribute authentication scheme using self-blindable certificates
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 215 - +
  • [38] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [39] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [40] A Federated Protocol for Active Authentication
    Nick, William
    Murphy, Alaysia
    Sabol, Cory
    Esterline, Albert
    SOUTHEASTCON 2017, 2017,