Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network

Vol. 16, No. 5, pp. 47-58, Oct. 2006
10.13089/JKIISC.2006.16.5.47, Full Text:
Keywords: Hamming Distance, authentication, PKI, certificate
Abstract

Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. Lee and J. Song, "Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network," Journal of The Korea Institute of Information Security and Cryptology, vol. 16, no. 5, pp. 47-58, 2006. DOI: 10.13089/JKIISC.2006.16.5.47.

[ACM Style]
Seok-Lae Lee and Joo-Seok Song. 2006. Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network. Journal of The Korea Institute of Information Security and Cryptology, 16, 5, (2006), 47-58. DOI: 10.13089/JKIISC.2006.16.5.47.