2012
DOI: 10.7763/ijet.2012.v4.371
|View full text |Cite
|
Sign up to set email alerts
|

Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…In [16] achieving authentication for ad hoc networks is in two ways: (direct and in-direct authentication). In direct authentication, two parties in prior make use of a preshared encryption key either one of the two symmetric or asymmetric key cryptography to establish verification within themselves and the flow of data between them.…”
Section: IImentioning
confidence: 99%
See 3 more Smart Citations
“…In [16] achieving authentication for ad hoc networks is in two ways: (direct and in-direct authentication). In direct authentication, two parties in prior make use of a preshared encryption key either one of the two symmetric or asymmetric key cryptography to establish verification within themselves and the flow of data between them.…”
Section: IImentioning
confidence: 99%
“…In direct authentication, two parties in prior make use of a preshared encryption key either one of the two symmetric or asymmetric key cryptography to establish verification within themselves and the flow of data between them. In in-direct authentication [16], it's necessary to involve a trusted third party (Certificate Authority (CA)) that is held responsible for certifying a particular identity to another identity. Hence, choosing the suitable authentication mechanism for MANET during ERM is more of a challenge because of the emergency situation as time plays critical role in emergency services and therefore, the authentication process is required to be lightweight and hence efficient.…”
Section: IImentioning
confidence: 99%
See 2 more Smart Citations
“…So the replay attacks become impossible. To prevent reply attack they add session parameter in the Ticket grand message [2]. Semih Dokurer and Y. M. Erten and Can Erkin Acar investigated the effects of black hole attack on the network performance.…”
Section: Literature Reviewmentioning
confidence: 99%