2016
DOI: 10.14257/astl.2016.138.02
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Mobile Node Authentication using Encrypted Session Key based on MANET

Abstract: With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes Session key-Encrypted key exchange authentication mechanism for a robust authentication based on MANET and th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In addition, by applying the hash function again in the received password verifier H n-i (P), If H(H n-i (P)) and the value H ni+1 (P) value of the two values compared to the values that match, destination node is to certify that the source node is to know the password correctly. If the source node and destination node perform a legal authentication process, destination node is stored in the directory and replace it with a password verifier H n-i (P) of source node [12].…”
Section: Figure 7 Session Key-eke Authentication Processmentioning
confidence: 99%
“…In addition, by applying the hash function again in the received password verifier H n-i (P), If H(H n-i (P)) and the value H ni+1 (P) value of the two values compared to the values that match, destination node is to certify that the source node is to know the password correctly. If the source node and destination node perform a legal authentication process, destination node is stored in the directory and replace it with a password verifier H n-i (P) of source node [12].…”
Section: Figure 7 Session Key-eke Authentication Processmentioning
confidence: 99%