PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Słowa kluczowe
Twórcy
autor
  • Mathematics laboratory, Djillali LIABES University, Sidi Bel Abbes, Algeria
autor
  • RCAM laboratory, Djillali LIABES University, Sidi Bel Abbes, Algeria
Bibliografia
  • 1. Asad A., Pirzada McDonald C., Kerberos Assisted Authentication in Mobile Ad-hoc Networks. In: CRPIT ’04 Proceedings of the 27th conference on Australasian computer science, Vol. 56, 41–46, Australian Computer Society, Inc., 2004.
  • 2. Bellovin S.M., Merritt M. Limitations of the Kerberos authentication system. ACM SIGCOMM Computer Communication Review, vol. 20(5), 1990, 119-132.
  • 3. Shamir A. How to share a secret. Communications of the ACM, Vol. 22(11), 1979, 612-613.
  • 4. Zhou L. and Haas Z.J., Securing Ad Hoc Networks. IEEE Network., vol. 13, 1999, 24-30.
  • 5. Azer M.A., El-Kassas S.M. and El-Soudani M.S. Threshold cryptography and authentication in ad hoc networks survey and challenges. In: Systems and Networks Communications, ICSNC 2007. IEEE Second International Conference on, p. 5.
  • 6. Govindan K. and Mohapatra P. Trust computations and trust dynamics in mobile adhoc networks: a survey. Communications Surveys & Tutorials, IEEE, 14(2), 2012, 279-298.
  • 7. Deng H., Mukherjee A., and Agrawal D.P. Thresh¬old and identity-based key management and authentication for wireless ad hoc networks. In: In¬formation Technology: Coding and Computing, Proceedings. ITCC 2004. IEEE International Con¬ference on, p. 107-111.
  • 8. Sarkar S., Kisku B., Misra S., Obaidat M.S. Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme. Wireless and Mobile Computing, Networking and Communications. WIMOB 2009. IEEE International Conference on, p. 258-262.
  • 9. Omar M., Challal Y., and Bouabdallah A. Reliable and fully distributed trust model for mobile ad hoc networks. Computers & Security, 28(3), 2009, 199-214.
  • 10. Park Y. and Moon S. Anonymous cluster-based MANETs with threshold signature. International Journal of Distributed Sensor Networks, Article ID 374713, 9 pages, 2013.
  • 11. Neuman T.Y., Hartman S., and Raeburn K. The Kerberos Network Authentication Service (V5). RFC 4120, July 2005.
  • 12. Yang Hao, Luo Haiyun, Ye Fan, et al. Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, vol. 11(1), 2004, 38-47.
  • 13. Dey H. and Datta R. A threshold cryptography based authentication scheme for mobile ad-hoc network. In: Advances in Networks and Communications. Springer Berlin Heidelberg, 2011. p. 400-409.
  • 14. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. Information Theory, IEEE Transactions on, vol. 31, 1985, p. 469-472.
  • 15. https://www.scs.carleton.ca/sites/default/files/ course_page/secretsharing.pdf, Last accessed: 14- 02-2014.
  • 16. Koblitz N. A Course in Number Theory and Cryptography (Graduate Texts in Mathematics, No 114), Springer-Verlag, 1994.
  • 17. Padma B.H., Chandravathi D. and Roja P. Prapoorna. Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz’s method. International Journal on Computer Science and Engineering, vol. 2(5), 2010.
  • 18. http://www.nsa.gov/business/programs/elliptic_ curve.shtml, Last accessed: 27-01-2014.
  • 19. Yi Seung and Kravets R. MOCA: Mobile certificate authority for wireless ad hoc networks. In: 2nd Annual PKI Research Workshop Program (PKI 03), Gaithersburg, Maryland 2003, p. 3-8.
  • 20. http://www.r-project.org/ Last accessed: 02-03- 2014.
  • 21. Ertaul L., and Chavan N.J. RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. Threshold, vol. 7(8), 2007, p. 9.
  • 22. Ertaul L. and Lu Weimin. ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). In: NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. Springer Berlin Heidelberg, 2005, 102-113.
  • 23. Lauter K. The advantages of elliptic curve cryptography for wireless security. Wireless Communications, IEEE, vol. 11(1), 2004, 62-67.
  • 24. Li Chun-Ta and Chu Yen-Ping. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks. IJ Network Security, vol. 8(2), 2009, 166-168.
  • 25. Corin R., Malladi S., Alves-Foss J., et al. Guess what? Here is a new tool that finds some new guessing attacks. Twente Univ. Enschede (Netherlands), Dept of Computer Science, 2003.
  • 26. Chai Zhenchuan, Cao Zhenfu and Lu Rongxing. Threshold password authentication against guessing attacks in ad hoc networks. Ad Hoc Networks, vol. 5(7), 2007, 1046-1054.
  • 27. Ruan Na, Nishide Takashi and Hori Yoshiaki. Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Journal of Information Processing, vol. 20(4), 2012, 846-853.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-387f5a1a-f678-484d-82c4-a6c5caf4b9f1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.