Advanced Search
Volume 32 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Zhou Xian-wei, Guo Ji-wen. HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169
Citation: Zhou Xian-wei, Guo Ji-wen. HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169

HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks

doi: 10.3724/SP.J.1146.2009.00169
  • Received Date: 2009-02-13
  • Rev Recd Date: 2009-11-22
  • Publish Date: 2010-04-19
  • Ad hoc Networks is characteristic of limited energy and memory. A novel entity authentication scheme based on HuffMHT for Ad hoc Networks is proposed to solve such problems. This method using the concept of HuffMHT can obtain an effective safe strategy. At the same time, symmetrical key algorithm and public key algorithm are just combined to reduce the authentication delay effectively and increase the network lifetime and enhances the security of the networks. Moreover, when clustering head and HuffMHT is built up in the Ad hoc Networks, Power-consumption-least algorithm are designed and Christofides algorithm are used in this paper, respectively, distance which notes effectively transmit signal together are reduced, the power which notes consume is debased, the network lifetime is increased.
  • loading
  • Karlof C and Wagner D. Secure routing in wireless sensornetworks: attacks and countermeasures [C]. IEEEInternational Workshop on sensor Network Protocols andApplications, California Univ., Berkeley, CA, USA, 2003:113-127.[2]Rebahi Y, Mujica-V V E, and Sisalem D. A reputation-basedtrust mechanism for ad hoc networks [C]. Proc. 10th IEEESymposium on Computers and Communications, FraunhoferFokus, Germany, 2005: 37-42.[3]Sun Y L, Han Z, and Yu W, et al.. Attacks on trustevaluation in distributed networks [C]. IEEE Conference onInformation Sciences and Systems, CLSS 2006-Proceedings,Rhode Island Univ., Kingston, RI, 2007: 1461-1466.[4]Tuptuk N and Lupu E. Risk based authorisation for mobilead hoc networks [J]. Lecture Notes in Computer Science,Springer-verlag, 2007, 4543: 188-191.[5]Rabadi N M and Mahmud S M. Privacy protection amongdrivers in vehicle-to-vehicle communication networks [C]. 4thAnnual IEEE Consumer Communications and NetworkingConference, CCNC2007, Las Vegas, NV, USA, 2007:281-286.[6]Papapanaqiotou K, Marias G F, and Georqiadis P et al..Performance evaluation of a distributed OCSP protocol overMANETs [C]. 3rd IEEE Consumer Communications andNetworking Conference, Piscataway, NJ, USA, 2006, 1: 1-5.[7]Wang L N, Shi D J, and Qin B P, et al.. Clustering-basedmerkel hash tree entity authentication scheme [J]. ChineseJournal of Sensors and Actuators, 2007, 20(6): 1338-1343.[8]Munoz J L, Forne J, and Esparza O, et al.. Efficientcertificate revocation system implementation: huffmanmerkle hash tree (HuffMHT) [J]. Springer-Verlag BerlinHeidelberg, LNCS, 2005, 3592: 119-127.[9]Aboudagga N, Refaei M T, and Eltoweissy M.Authentication protocols for ad hoc networks: taxonomy andresearch issues [C]. International Workshop on ModelingAnalysis and Simulation of Wireless and Mobile Systems,Montreal, Quebec, Canada, 2005: 96-104.[10]Hu W, Chou C T, and Jha S, et al.. Deploying long-lived andcost-effective hybrid sensor networks [J].Ad hoc Networks.2006, 4(6):749-767[11]Korte B and Vygen J. Combinatorial Optimization Theoryand Algorithms (Fourth Edition) [M]. Springer-Verlag BerlinHeidelberg, 2008: 527-529.[12]Skold M, Yeongyoon C, and Nilsson J. An analysis of mobileradio Ad hoc networks using cluster architectures [C]. 57thIEEE Vehicular Technology Conference, Swedish DefenceRes. Agency, Linkoping, Sweden, 2003, 1: 181-185.[13]Chiasserini C F, Chlamtac I, and Monti P, et al.. Anenergy-efficient method for nodes assignment in cluster-basedad hoc networks [J].Wireless Networks.2004, 10(3):223-231[14]Heinzelman W B, Chandrakasan A P, and Balakrishnan H.An application-specific protocol architecture for wirelessmicrosensor networks [J]. IEEE Transactions on WirelessCommunications, 2002, 1(4): 660-670.[15]叶银法, 陆健贤, 罗丽等. WCDMA 系统工程手册[M]. 机械工业出版社, 2006: 470-471.Ye Y F, Lu J X, and Luo L, et al.. Handbook of WCMASystem Engineering [M]. China Machine Press, 2006:470-471.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3663) PDF downloads(779) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return