Message Authentication Scheme for ad hoc Networks with Homomorphic Hash Function

Author(s):  
Seiya Matsunaga ◽  
Naotoshi Adachi
2012 ◽  
Vol 6-7 ◽  
pp. 913-918 ◽  
Author(s):  
Ji Zhi Wang ◽  
Ying Long Wang ◽  
Shu Jiang Xu

Many authentication protocols in ad hoc networks are identity based, which means that in order for one node to trust another, it needs to know the other node’s identity. Hence there exists an inherent trade-off between trust and anonymity. We propose an anonymous authentication scheme, where each node, instead of using its real identity, generates a dynamic pseudonym using a one-way hash function. With the help of a CA offline, the scheme can realize the authentication procedure based on discrete logarithms problem. We analyze the security and the anonymity in the scheme, which shows that it is very valid.


Vehicular ad hoc networks (VANETs) are under active development phase, especially due to the latest and foremost wireless communication and networking technologies. Basically VANETs consist of some parts which play the major role to enable message authentication between vehicles which are on-board units as well as roadside units. To reduce the load on trusted authorities several roadside units are set up and message authentication using proxy vehicles has been proposed. This used to minimize the computational overhead of roadside units significantly. Due to this message authentication scheme the efficiency of roadside unit improves. In this paper we propose an Efficient Hybrid Message Authentication Scheme (EHMAS) that deals with the technique where it not only guarantees message authenticity, but it is also resistant against impersonation and modification attacks. First we explain the properties of the attacks in security model. Second we provide an EHMAS scheme where a novel authentication technique is proposed for registration and verification of users using elliptic crypto system. Finally the paper concluded with the scope of the proposed work and provides future enhancement using machine learning techniques.


2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


Sign in / Sign up

Export Citation Format

Share Document