[go: up one dir, main page]

Alomari, 2015 - Google Patents

Mutual authentication and updating the authentication key in manets

Alomari, 2015

Document ID
1452881880280485501
Author
Alomari A
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Abstract Mobile Ad hoc Networks (MANETs) are new wireless networks with a self- configuring and self-maintaining topology, also characterized as dynamic topology. The architecture in MANETs has been introduced few years ago and its main characteristic is …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management

Similar Documents

Publication Publication Date Title
Vinayakan et al. A Secured On-Demand Routing Protocol for Mobile Ad-Hoc Network-A Literature Survey
Gupte et al. Secure routing in mobile wireless ad hoc networks
Moudni et al. Secure routing protocols for mobile ad hoc networks
Gupta et al. A review of routing protocols for mobile ad hoc networks
WO2013008026A2 (en) Framework for ubiquitous networking
Kousar et al. A Secure Data Dissemination in a DHT‐Based Routing Paradigm for Wireless Ad Hoc Network
Moamen et al. Secure multicast routing protocols in mobile ad‐hoc networks
Eichler et al. Secure routing in a vehicular ad hoc network
Nissar et al. Lightweight authentication-based scheme for AODV in ad-hoc networks
Selvakumar et al. Secure group key management protocol for mobile ad hoc networks
Alomari Mutual authentication and updating the authentication key in manets
Sathiamoorthy et al. STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs
Qazi et al. Securing wireless mesh networks with ticket-based authentication
Pani et al. Secure hybrid routing for MANET resilient to internal and external attacks
Qabajeh et al. A more secure and scalable routing protocol for mobile ad hoc networks
Li et al. SEAODV: a security enhanced AODV routing protocol for wireless mesh networks
Panday et al. A Review on security Issues of AODV routing protocol for MANETs
Srivastava et al. Secure Data Transmission in MANET Routing Protocol
Boukerche et al. ARMA: an efficient secure ad hoc routing protocol
Nguyan et al. Security routing analysis for mobile ad hoc networks
Annadurai et al. Highly reputed authenticated routing in MANET (HRARAN)
Qabajeh et al. Secure unicast position-based routing protocols for ad-hoc networks
Sheklabadi et al. An anonymous secure routing protocol for mobile ad hoc networks
Phung et al. DASSR: A distributed authentication scheme for secure routing in wireless ad-hoc networks
Christy et al. Two-Level Data Packet Security Mechanism ï¿ ½ Secure Location-Aided Routing (SLAR)