Chứng thực lẫn nhau trong mạng Ad hoc - Mô hình ngưỡng sử dụng các nút ngẫu nhiên
Corressponding author's email:
tapchikhgkdt@hcmute.edu.vnKeywords:
MANETs, authentication protocol, protocol security, secret sharing, key manage- ment.Abstract
In recent years, mobile ad hoc wireless networks are gaining popularity due to their mobility, flexibility and ease of deployment everywhere. A mobile ad hoc wireless network is an independent network without any central authority, e.g., infrastructure mode. In the network system, security and authentication scheme always consider on top. We propose threshold k mutual authentication protocol in mobile ad hoc wireless network using randomized k nodes, which solves those problems using a combination of strong points in PSK (pre-share keys), PKI (public key infrastructure) and RSA. Our proposed authentication protocol authenticate a new node join the network by any node that running in network. Salient of this solution is designing to implement in mobile phone – low configuration device. Our solution carry security and flexibility, service group activities, urgency, rescue such as fire-brigade, rescue squad, police, flood…
Downloads: 0
References
Bùi Doãn Khanh và Nguyễn Đình Thúc. Giáo trình mã hóa thông tin – Lý thuyết và ứng dụng, Nhà xuất bản Lao động xã hội. Tháng 12/2004.
Nguyễn Đình Thúc và Bùi Doãn Khanh. Mã hóa thông tin với Java – Tập 2: Mã hóa – Mật mã, Nhà xuất bản Lao động xã hội. Tháng 10/2006.
Press W. H., Teukolsky S. A., Vetterling W. T. and Flannery B. P. Numerical Recipes in C: The Art of Scientific Computing, 2nd ed, Cambridge University Press, 1992.
Yong Lee and Zygmunt J. Haas. Authentication in very large ad hoc networks using randomized groups, IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, 2005.
Khalili A., Katz J. and Arbaugh W.A. Towards secure key distribution in truly adhoc networks, In Proceedings of the IEEE Workshop on Security and Assurance in Ad-Hoc Networks, 2003.
Thuc N.D., Phu N.C., Bao T.N., and Hai V.T. A Software Solution for Defending against Man-in-the-middle attacks on WLAN. GESTS International Transactions on Computer Science and Engineering. Vol.24, No.01, December 30, 2005.
Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang. Securing Mobile Ad Hoc Networks with Certificateless Public Keys. IEEE Transaction on Dependable and Secure Computing, VOL. 3, NO. 4, 2006, pp. 386-399.
Srdjan CÊapkun, Jean-Pierre Hubaux and Levente Buttyán. Mobility Helps Security in Ad Hoc Networks. ACM MobiHoc ’03, June 1-3, 2003.
Carlton R. Davis. Security protocols for mobile ah hoc networks. McGill University, Montreal, Quebec. Doctor thesis. August 2006.
Sirapat Boonkrong and Russell Bradford. Authentication in Mobile Ad Hoc Networks. University of Bath. 2004.
Downloads
Published
How to Cite
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © JTE.