Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks

Wonjun Lee, Wiroon Sriborrirux

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Abstract

To achieve reliable and secure authenticated broadcast routing, we propose a novel certificate-based scheme in AODV (in short, CBS-AODV) and an identity-based signature scheme in AODV (IBS-AODV)1, which apply the use of ID-based cryptography to abate overhead effect by exchanging the certificate public key. Using our proposed schemes, we could reduce the routing load up to 24.8as well as dramatically save the storage space consumption of mobile node. Our protocols can reduce the size of key while providing the same security level as that of RSA and DSA.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsHyun-Kook Kahng, Shigeki Goto
PublisherSpringer Verlag
Pages925-934
Number of pages10
ISBN (Print)3540230343
DOIs
Publication statusPublished - 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3090
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Ad Hoc networks
  • CBS-AODV
  • Elliptic curve
  • IBS-AODV
  • Secure routing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks'. Together they form a unique fingerprint.

  • Cite this

    Lee, W., & Sriborrirux, W. (2004). Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks. In H-K. Kahng, & S. Goto (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 925-934). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3090). Springer Verlag. https://doi.org/10.1007/978-3-540-25978-7_93