An authentication for group communications in AD-HOC networks

Authors

  • Peter Akubo Alabi Federal University of Technology Owerri

DOI:

https://doi.org/10.31686/ijier.vol9.iss2.2941

Keywords:

User authentication, Group communication, secret sharing, Ad hoc network, Strong t -consistency

Abstract

Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication that authenticates all users in a group at once. The group authentication protocol is specially designed to support group communications. There is a group manager who is responsible to manage the group communication. During registration, each user of a group obtains an unique token from the group manager. Users present their tokens to determine whether they all belong to the same group or not. The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.

Downloads

Download data is not yet available.

Author Biography

  • Peter Akubo Alabi , Federal University of Technology Owerri

    Department of Information Technology

References

Benaloh J. C., (1987) Secret sharing homomorphisms: keeping shares of a secret, in: Proceedings of CRYPTO '86, LNCS 263, pp. 251-260. DOI: https://doi.org/10.1007/3-540-47721-7_19

Bruhadeshwar B. and Kulkarni S.S., (2011) Balancing revocation and storage trade-offs in secure group communication, IEEE Transactions on Dependable and Secure Computing, 8 (1): 58-73. DOI: https://doi.org/10.1109/TDSC.2009.27

Catur Bhakti M. A., Abdullah A., and Jung L. T., (2007) EAP-based authentication for ad hoc network, in: Proc. 2007 Seminar Nasional Aplikasi Teknologi Informasi – SNATI’07, pp. C-133-C- 137.

Caballero-Gil P. and Hernndez-Goya C., (2009) Self-organized authentication in Mobile ad-hoc networks, Journal of Communications and Networks, 11(5): 509-517. DOI: https://doi.org/10.1109/JCN.2009.6388395

Capkun S., Buttyn, L. and Hubaux J. P., (2003) Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on mobile computing, 2(1):52-64. DOI: https://doi.org/10.1109/TMC.2003.1195151

Das M. L., (2009) Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 8 (3): 1086-1090. DOI: https://doi.org/10.1109/TWC.2008.080128

Downnard I., (2002) Public-key cryptography extensions into Kerberos, IEEE Potentials, 21(5): 30- 34. DOI: https://doi.org/10.1109/MP.2002.1166623

Harn L. and Lin C., (2010) Strong verifiable secret sharing scheme, Information Sciences, 180(16): 3059-3064. DOI: https://doi.org/10.1016/j.ins.2010.04.016

Ku W. C., (2005) Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture, IEEE Transactions on Neural Networks, 16(4), 1002-1005. DOI: https://doi.org/10.1109/TNN.2005.849781

Oppliger R., Hauser R., and Basin D., (2008) SSL/TLS session-aware user authentication, Computer, 41(3): 59-65. DOI: https://doi.org/10.1109/MC.2008.98

Pirzada A. A. and McDonald C., (2004) Kerberos assisted authentication in mobile ad-hoc networks, in: Proceedings of the 27th Australasian Computer Science Conference –ACSC’04, 26(1), pp. 41-46.

Ren K., Yu S., Lou W., and Zhang Y., (2009) Multi-user broadcast authentication in wireless sensor networks, IEEE Transactions on Vehicular Technology, 58(8): 4554-4564. DOI: https://doi.org/10.1109/TVT.2009.2019663

Rivest R., Shamir A., and Adleman L., (1978) A method for obtaining digital signatures and public- key cryptosystems, Communications of the ACM, 21 (2): 120-126. DOI: https://doi.org/10.1145/359340.359342

Sakarindr P. and Ansari N., (2010) Survey of security services on group communications, IET Information. Security. 4(4): 258-272. DOI: https://doi.org/10.1049/iet-ifs.2009.0261

Shamir A., (1979) How to share a secret, Communications of the ACM, 22(11): 612-613. DOI: https://doi.org/10.1145/359168.359176

Yan J., Blackwell A., Anderson R., and Grant A., (2004) Password memorability and security: Empirical results, IEEE Security & Privacy Magazine, 2(5):25-31. DOI: https://doi.org/10.1109/MSP.2004.81

Downloads

Published

2021-02-01

How to Cite

Alabi , P. A. (2021). An authentication for group communications in AD-HOC networks. International Journal for Innovation Education and Research, 9(2), 396-404. https://doi.org/10.31686/ijier.vol9.iss2.2941
Received 2021-01-12
Accepted 2021-01-23
Published 2021-02-01