Autosoft Journal

Online Manuscript Access


Authentication Scheme for Cluster-Structured Ad Hoc Network


Authors



Abstract

In this paper, an authentication scheme is proposed for cluster-structured Ad Hoc network. All the nodes in the network are classified into two levels: cluster head nodes and cluster member nodes, so there are three kinds of authentication between them. To satisfy the requirements of each kind, two authentication protocols are proposed: constant-sized traceable Ring Signature based authentication protocol and self-updating one-time password mutual authentication protocol. The analysis shows that the whole process of authentication does not need the participation of the third trusted party, which is fully self-organizing, and the anonymity is also achieved. Due to the cluster structure, the network has better scalability.


Keywords


Pages

Total Pages: 9
Pages: 123-131

DOI
10.1080/10798587.2013.787190


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 19
Issue: 2
Year: 2013

Cite this document


References

Basagni S. Mobile Ad Hoc networking https://doi.org/10.1002/0471656895

Venkatraman L. IEEE Wireless Communications and Networking Conference

Bechler M. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies

Li X. Proceedings of International Conference on Computer Communications and Networks

Rachedi, A. & Benslimane, A. (2006) Trust and mobility-based clustering algorithm for secure mobile Ad Hoc networks. Systems and Networks Communications. ICSNC ”06. International Conference, 2006: 72

Zhao Y. J. Application Research of Computers 27.10 (2010)

Feng, X. U., Xuan, L. I. U., Xin, L. V. & Yang, X. S. An authentication protocol for Ad Hoc network based on constant-sized traceable ring signature. SENSORS. Online First

Feng, X. U., Hongxu, M. A., Xin, L. V. & Yang, X. S. Self-updating one-time password mutual authentication protocol for Ad Hoc network. SENSORS. Online First

Yang W. D. Computer Engineering and Applications 46.21 (2010)

Lin C. IEEE Global Telecommunication Conference

Parekh, A. K. (1994). Selecting routers in Ad-Hoc wireless networks. Proceedings of the SBT/IEEE International Telecommunications Symposium

Basagni, S. (1999). Distributed clustering for Ad Hoc networks. Proceedings of the 1999 International SymPosium on Parallel Architectures, Algorithms and Networks

Chatterjee M. Cluster Computing 5.2 (2002) https://doi.org/10.1023/A:1013941929408

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)

TWO YEAR CITATIONS PER DOCUMENT (SJR DATA): 0.993 (2018)
SJR: "The two years line is equivalent to journal impact factor ™ (Thomson Reuters) metric."





Journal: 1995-Present


CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/