An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing

2007 ◽  
Vol 43 (4) ◽  
pp. 1767-1780 ◽  
Author(s):  
Dimitrios D. Vergados ◽  
Giannis Stergiou
2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


2016 ◽  
Vol 64 ◽  
pp. 50-60 ◽  
Author(s):  
J. Sánchez-García ◽  
J.M. García-Campos ◽  
D.G. Reina ◽  
S.L. Toral ◽  
F. Barrero

Sign in / Sign up

Export Citation Format

Share Document