Chứng thực lẫn nhau trong mạng Ad hoc - Mô hình ngưỡng sử dụng các nút ngẫu nhiên

Authors

  • Tran Ngoc Bao Sai Gon University, Vietnam
  • Do Dinh Thai Ho Chi Minh City University of Education, Vietnam

Corressponding author's email:

tapchikhgkdt@hcmute.edu.vn

Keywords:

MANETs, authentication protocol, protocol security, secret sharing, key manage- ment.

Abstract

In recent years, mobile ad hoc wireless networks are gaining popularity due to their mobility, flexibility and ease of deployment everywhere. A mobile ad hoc wireless network is an independent network without any central authority, e.g., infrastructure mode. In the network system, security and authentication scheme always consider on top. We propose threshold k mutual authentication protocol in mobile ad hoc wireless network using randomized k nodes, which solves those problems using a combination of strong points in PSK (pre-share keys), PKI (public key infrastructure) and RSA. Our proposed authentication protocol authenticate a new node join the network by any node that running in network. Salient of this solution is designing to implement in mobile phone – low configuration device. Our solution carry security and flexibility, service group activities, urgency, rescue such as fire-brigade, rescue squad, police, flood…

Downloads: 0

Download data is not yet available.

References

Bùi Doãn Khanh và Nguyễn Đình Thúc. Giáo trình mã hóa thông tin – L‎ý thuyết và ứng dụng, Nhà xuất bản Lao động xã hội. Tháng 12/2004.

Nguyễn Đình Thúc và Bùi Doãn Khanh. Mã hóa thông tin với Java – Tập 2: Mã hóa – Mật mã, Nhà xuất bản Lao động xã hội. Tháng 10/2006.

Press W. H., Teukolsky S. A., Vetterling W. T. and Flannery B. P. Numerical Recipes in C: The Art of Scientific Computing, 2nd ed, Cambridge University Press, 1992.

Yong Lee and Zygmunt J. Haas. Authentication in very large ad hoc networks using randomized groups, IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, 2005.

Khalili A., Katz J. and Arbaugh W.A. Towards secure key distribution in truly adhoc networks, In Proceedings of the IEEE Workshop on Security and Assurance in Ad-Hoc Networks, 2003.

Thuc N.D., Phu N.C., Bao T.N., and Hai V.T. A Software Solution for Defending against Man-in-the-middle attacks on WLAN. GESTS International Transactions on Computer Science and Engineering. Vol.24, No.01, December 30, 2005.

Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang. Securing Mobile Ad Hoc Networks with Certificateless Public Keys. IEEE Transaction on Dependable and Secure Computing, VOL. 3, NO. 4, 2006, pp. 386-399.

Srdjan CÊapkun, Jean-Pierre Hubaux and Levente Buttyán. Mobility Helps Security in Ad Hoc Networks. ACM MobiHoc ’03, June 1-3, 2003.

Carlton R. Davis. Security protocols for mobile ah hoc networks. McGill University, Montreal, Quebec. Doctor thesis. August 2006.

Sirapat Boonkrong and Russell Bradford. Authentication in Mobile Ad Hoc Networks. University of Bath. 2004.

Published

29-08-2007

How to Cite

Trần Ngọc Bảo, & Đỗ Đình Thái. (2007). Chứng thực lẫn nhau trong mạng Ad hoc - Mô hình ngưỡng sử dụng các nút ngẫu nhiên. Journal of Technical Education Science, 2(2), 42–48. Retrieved from https://jte.edu.vn/index.php/jte/article/view/928

Issue

Section

Research Article

Categories