An authentication for group communications in AD-HOC networks
DOI:
https://doi.org/10.31686/ijier.vol9.iss2.2941Keywords:
User authentication, Group communication, secret sharing, Ad hoc network, Strong t -consistencyAbstract
Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication that authenticates all users in a group at once. The group authentication protocol is specially designed to support group communications. There is a group manager who is responsible to manage the group communication. During registration, each user of a group obtains an unique token from the group manager. Users present their tokens to determine whether they all belong to the same group or not. The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.
Downloads
References
Benaloh J. C., (1987) Secret sharing homomorphisms: keeping shares of a secret, in: Proceedings of CRYPTO '86, LNCS 263, pp. 251-260. DOI: https://doi.org/10.1007/3-540-47721-7_19
Bruhadeshwar B. and Kulkarni S.S., (2011) Balancing revocation and storage trade-offs in secure group communication, IEEE Transactions on Dependable and Secure Computing, 8 (1): 58-73. DOI: https://doi.org/10.1109/TDSC.2009.27
Catur Bhakti M. A., Abdullah A., and Jung L. T., (2007) EAP-based authentication for ad hoc network, in: Proc. 2007 Seminar Nasional Aplikasi Teknologi Informasi – SNATI’07, pp. C-133-C- 137.
Caballero-Gil P. and Hernndez-Goya C., (2009) Self-organized authentication in Mobile ad-hoc networks, Journal of Communications and Networks, 11(5): 509-517. DOI: https://doi.org/10.1109/JCN.2009.6388395
Capkun S., Buttyn, L. and Hubaux J. P., (2003) Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on mobile computing, 2(1):52-64. DOI: https://doi.org/10.1109/TMC.2003.1195151
Das M. L., (2009) Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 8 (3): 1086-1090. DOI: https://doi.org/10.1109/TWC.2008.080128
Downnard I., (2002) Public-key cryptography extensions into Kerberos, IEEE Potentials, 21(5): 30- 34. DOI: https://doi.org/10.1109/MP.2002.1166623
Harn L. and Lin C., (2010) Strong verifiable secret sharing scheme, Information Sciences, 180(16): 3059-3064. DOI: https://doi.org/10.1016/j.ins.2010.04.016
Ku W. C., (2005) Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture, IEEE Transactions on Neural Networks, 16(4), 1002-1005. DOI: https://doi.org/10.1109/TNN.2005.849781
Oppliger R., Hauser R., and Basin D., (2008) SSL/TLS session-aware user authentication, Computer, 41(3): 59-65. DOI: https://doi.org/10.1109/MC.2008.98
Pirzada A. A. and McDonald C., (2004) Kerberos assisted authentication in mobile ad-hoc networks, in: Proceedings of the 27th Australasian Computer Science Conference –ACSC’04, 26(1), pp. 41-46.
Ren K., Yu S., Lou W., and Zhang Y., (2009) Multi-user broadcast authentication in wireless sensor networks, IEEE Transactions on Vehicular Technology, 58(8): 4554-4564. DOI: https://doi.org/10.1109/TVT.2009.2019663
Rivest R., Shamir A., and Adleman L., (1978) A method for obtaining digital signatures and public- key cryptosystems, Communications of the ACM, 21 (2): 120-126. DOI: https://doi.org/10.1145/359340.359342
Sakarindr P. and Ansari N., (2010) Survey of security services on group communications, IET Information. Security. 4(4): 258-272. DOI: https://doi.org/10.1049/iet-ifs.2009.0261
Shamir A., (1979) How to share a secret, Communications of the ACM, 22(11): 612-613. DOI: https://doi.org/10.1145/359168.359176
Yan J., Blackwell A., Anderson R., and Grant A., (2004) Password memorability and security: Empirical results, IEEE Security & Privacy Magazine, 2(5):25-31. DOI: https://doi.org/10.1109/MSP.2004.81
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Alabi Peter Akubo

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.
How to Cite
Accepted 2021-01-23
Published 2021-02-01