Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks

Author(s):  
Hyosun Roh ◽  
Souhwan Jung
2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


2015 ◽  
Vol 30 (6) ◽  
pp. e3081 ◽  
Author(s):  
Chin-Ling Chen ◽  
Mao-Lun Chiang ◽  
Chun-Cheng Peng ◽  
Chun-Hsin Chang ◽  
Qing-Ru Sui

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Tsu-Yang Wu ◽  
Zhiyuan Lee ◽  
Lei Yang ◽  
Chien-Ming Chen

While cloud computing and Internet of Things (IoT) technologies have gradually matured, mobile intelligent transportation systems have begun to be widely used. In particular, the application of vehicular ad hoc networks (VANETs) is very convenient for real-time collection and analysis of traffic data. VANETs provide a great convenience for drivers and passengers, making it easier to choose routes. Currently, most research on VANETs obtains data through cloud servers. However, there are few studies on cloud servers obtaining vehicle information through the roadside unit (RSU). In the process of reading traffic information, there will be some private and sensitive information, which may be intercepted or tampered with in untrusted public channels. Therefore, it is necessary to propose a protocol to protect vehicle data during the information reading phase. In this paper, we propose a new provably secure authentication protocol to negotiate a session key before transmitting traffic information. This protocol can complete mutual authentication and generate a session key. Finally, security analysis and performance analysis show that our protocol is secure and efficient.


2016 ◽  
Vol 64 ◽  
pp. 50-60 ◽  
Author(s):  
J. Sánchez-García ◽  
J.M. García-Campos ◽  
D.G. Reina ◽  
S.L. Toral ◽  
F. Barrero

Sign in / Sign up

Export Citation Format

Share Document