Limits...
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

Chen H, Ge L, Xie L - Sensors (Basel) (2015)

Bottom Line: Moreover, user authentication is the first safety barrier in a network.Security analysis shows that our proposed scheme is resilient to common known attacks.In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

View Article: PubMed Central - PubMed

Affiliation: Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China. chenhf@zju.edu.cn.

ABSTRACT
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

No MeSH data available.


The user registration phase.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541922&req=5

sensors-15-17057-f002: The user registration phase.

Mentions: The interaction diagram of the user registration phase mentioned above is shown in Figure 2.


A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

Chen H, Ge L, Xie L - Sensors (Basel) (2015)

The user registration phase.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541922&req=5

sensors-15-17057-f002: The user registration phase.
Mentions: The interaction diagram of the user registration phase mentioned above is shown in Figure 2.

Bottom Line: Moreover, user authentication is the first safety barrier in a network.Security analysis shows that our proposed scheme is resilient to common known attacks.In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

View Article: PubMed Central - PubMed

Affiliation: Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China. chenhf@zju.edu.cn.

ABSTRACT
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

No MeSH data available.