Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Communications of the ACM
Negotiation-based protocols for disseminating information in wireless sensor networks
Wireless Networks - Selected Papers from Mobicom'99
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
While applicable fields of ad-hoc network become extensive, security gets more attention, especially authentication. Threshold cryptography [7] allows ad-hoc nodes to authenticate each other by cooperation of nodes. There are many authentication schemes based on threshold cryptography, but these assume pre-key distribution before network configuration. This paper proposes a reliable multistage authentication scheme for clustering based wireless ad-hoc networks. The secured key distribution mechanism is considered in contrast to current schemes. Every node in networks is required to authenticate another before data transmission. The effectiveness of the proposed scheme is verified by means of simulations.