Open Access   Article Go Back

Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects

M. Bhuvaneswari1 , L. VijayaKalyani2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-9 , Page no. 90-99, Sep-2014

Online published on Oct 04, 2014

Copyright © M. Bhuvaneswari, L. VijayaKalyani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Bhuvaneswari, L. VijayaKalyani, “Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.90-99, 2014.

MLA Style Citation: M. Bhuvaneswari, L. VijayaKalyani "Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects." International Journal of Computer Sciences and Engineering 2.9 (2014): 90-99.

APA Style Citation: M. Bhuvaneswari, L. VijayaKalyani, (2014). Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects. International Journal of Computer Sciences and Engineering, 2(9), 90-99.

BibTex Style Citation:
@article{Bhuvaneswari_2014,
author = {M. Bhuvaneswari, L. VijayaKalyani},
title = {Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2014},
volume = {2},
Issue = {9},
month = {9},
year = {2014},
issn = {2347-2693},
pages = {90-99},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=261},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=261
TI - Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects
T2 - International Journal of Computer Sciences and Engineering
AU - M. Bhuvaneswari, L. VijayaKalyani
PY - 2014
DA - 2014/10/04
PB - IJCSE, Indore, INDIA
SP - 90-99
IS - 9
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3465 3352 downloads 3640 downloads
  
  
           

Abstract

Ad hoc networks, such as device and moveable ad hoc networks, necessity overwhelmed a myriad of care examinations to realize their possible in composed civil and armed applications. Typically, ad hoc nets are prearranged in un-trusted environments. Consequently, verification is a precursor to any safe connections in these networks. Recently, frequent verification procedures consume remained future for ad hoc networks. To date, there is no communal outline to assess these protocols. In the direction of emerging such a framework, this newspaper proposes a general verification procedure and a new taxonomy that clarifies resemblances and changes amid verification procedures stated in the literature. The taxonomy is based upon the role of nodes in the verification function, founding of credentials, and type of credentials. We also inspire the essential for a verification group building and deliberate certain exposed investigation issues.

Key-Words / Index Term

Authentication, net Security, procedure Taxonomy, ad hoc Networks, Credentials

References

[1] Xuguang Ren ; Coll. of Inf. Sci. & Technol., Jinan Univ., Guangzhou, China ; Xin-Wen Wu, �A novel dynamic user authentication scheme�, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 713 � 717
[2] Jinwei Wang ; 28th Res. Inst, CETC, Nanjing ; Shiguo Lian ; Guangjie Liu, �On the analysis and design of secure multimedia authentication scheme�, Published in: Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on Date of Conference: 25-27 Aug. 2008 Page(s): 1298 � 1302
[3] Shen-Ho Lin ; Dept. of Electr. Eng., Chang Gung Univ., Taiwan ; Jung-Hui Chiu ; Sung-Shiou Shen, �The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks� Published in: Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on Date of Conference: 4-6 Nov. 2010 Page(s): 429 � 434
[4] Qing Li ; Wireless Inf. Network Lab. (WINLAB), Rutgers Univ., Piscataway, NJ, USA ; Trappe, W. �Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security� Published in: Information Forensics and Security, IEEE Transactions on (Volume:1 , Issue: 2 ) Date of Publication: June 2006 Page(s): 190 � 204
[5] Bachan, P. ; Electron. & Commun. Engig. Dept., GL A Group of Instn., Mathura, India ; Singh, B. �Performance evaluation of authentication protocols for IEEE 802.11 standard� Published in: Computer and Communication Technology (ICCCT), 2010 International Conference on Date of Conference: 17-19 Sept. 2010 Page(s): 792 � 799
[6] Javed, A. ; Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany ; Bletgen, D. ; Kohlar, F. ; Durmuth, M. more authors �Secure Fallback Authentication and the Trusted Friend Attack� Published in: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on Date of Conference: June 30 2014-July 3 2014 Page(s): 22 � 28
[7] Dinesha, H.A. ; CORI, Bangalore, India ; Agrawal, V.K. �Multi-level authentication technique for accessing cloud services� Published in: Computing, Communication and Applications (ICCCA), 2012 International Conference on Date of Conference: 22-24 Feb. 2012 Page(s): 1 � 4
[8] Fang Lan ; Dept. of Network Res., Inst. of Syst. Eng., Beijing, China ; Wang Chunlei ; Ma Guoqing, �A framework for network security situation awareness based on knowledge discovery� Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:1 ) Date of Conference: 16-18 April 2010 Page(s): V1-226 - V1-231
[9] Wu Kehe ; Dept. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing, China ; Zhang Tong ; Li Wei ; Ma Gang, �Security Model Based on Network Business Security� Published in: Computer Technology and Development, 2009. ICCTD `09. International Conference on (Volume:1 ) Date of Conference: 13-15 Nov. 2009 Page(s): 577 � 580
[10] Zhihu Wang ; Guangxi Econ. Manage. Cadre Coll., Nanning, China, �Design and realization of computer network security perception control system� Published in: ommunication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on Date of Conference: 27-29 May 2011 Page(s): 163 � 166
[11] Rongrong Xi ; Inst. of Comput. Technol., Beijing, China ; Shuyuan Jin ; XiaoChun Yun ; YongZheng Zhang, �CNSSA: A Comprehensive Network Security Situation Awareness System� Published in: Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on Date of Conference: 16-18 Nov. 2011 Page(s): 482 � 487
[12] Xiaoyan Li ; Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Qingxian Wang ; Lin Yang ; Xiangyang Luo, �The Research on Network Security Visualization Key Technology� Published in: Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on Date of Conference: 2-4 Nov. 2012 Page(s): 983 � 988
[13] Bhandari, P. ; Doaba Coll., Jalandhar, India ; Gujral, M.S. �Ontology based approach for perception of network security state� Published in: Engineering and Computational Sciences (RAECS), 2014 Recent Advances in Date of Conference: 6-8 March 2014 Page(s): 1 � 6
[14] Zhiyong Lu ; LEETC, Luoyang, China ; Yunyan Zhou, �The Evaluation Model for Network Security� Published in: Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on Date of Conference: 7-9 April 2014 Page(s): 690 � 694
[15] Songmei Zhang ; Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China ; Shan Yao ; Xin`en Ye ; Chunhe Xia, �A Network Security Situation Analysis framework based on information fusion� Published in: Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International (Volume:1 ) Date of Conference: 20-22 Aug. 2011 Page(s): 326 � 332
[16] Beydoun, K. ; Dept. of Comput. Sci., Lebanese Univ., Hadath, Lebanon ; Felea, V. �WSN hierarchical routing protocol taxonomy� Published in: Telecommunications (ICT), 2012 19th International Conference on Date of Conference: 23-25 April 2012 Page(s): 1 � 6
[17] Kelly, D. ; Human Effectiveness Directorate, Air Force Res. Lab., Wright-Patterson AFB, OH, USA ; Raines, R. ; Baldwin, R. ; Grimaila, M. more authors �Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics� Published in: Communications Surveys & Tutorials, IEEE (Volume:14 , Issue: 2 ) Date of Publication: Second Quarter 2012 Page(s): 579 � 606
[18] Syverson, P. ; Naval Res. Lab., Washington, DC, USA, �A taxonomy of replay attacks [cryptographic protocols]� Published in: Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings Date of Conference: 14-16 Jun 1994 Page(s): 187 � 191
[19] Ramalho, M. ; Alcatel Corp. Res. Centre, Antwerp, Belgium, �Intra- and inter-domain multicast routing protocols: A survey and taxonomy� Published in: Communications Surveys & Tutorials, IEEE (Volume:3 , Issue: 1 ) Date of Publication: First Quarter 2000 Page(s): 2 � 25
[20] Obraczka, K. ; Inf. Sci. Inst., Univ. of Southern California, Marina del Rey, CA, USA, �Multicast transport protocols: a survey and taxonomy� Published in: Communications Magazine, IEEE (Volume:36 , Issue: 1 ) Date of Publication: Jan 1998 Page(s): 94 � 102
[21] Nan Guo ; Coll. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Tianhan Gao ; Bin Zhang, �BPVrfy: Hybrid Cryptographic Scheme Based -- Federate Identity Attributes Verification Model for Business Processes� Published in: Availability, Reliability and Security (ARES), 2012 Seventh International Conference on Date of Conference: 20-24 Aug. 2012 Page(s): 417 � 424
[22] Chun-Hong Jiang ; Dept. of Electron. Eng., Tsinghua Univ., Beijing, China ; Guang-da Su, �Information fusion in face and fingerprint identity verification system� Published in: Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on (Volume:6 ) Date of Conference: 26-29 Aug. 2004 Page(s): 3529 - 3535 vol.6
[23] Slomovic, A. �Privacy Issues in Identity Verification� Published in: Security & Privacy, IEEE (Volume:12 , Issue: 3 ) Date of Publication: May-June 2014 Page(s): 71 � 73
[24] Junhua Chen ; Sch. of Comput. Sci. & Technol., Beijing Inst. of Technol., Beijing ; Wu Peng �A Zero-Knowledge Identity Verification Protocol Using Blind Watermark� Published in: Computer Engineering and Technology, 2009. ICCET `09. International Conference on (Volume:2 ) Date of Conference: 22-24 Jan. 2009 Page(s): 496 � 498
[25] Songwei Wang ; R&D Inst. of Integrated Meas. & Control, Dalian Polytech. Univ., Dalian, China ; Changwu Li ; Jian Liu ; Zhisen Wang, �Design of identity verification unit and management system� Published in: Communication Technology and Application (ICCTA 2011), IET International Conference on Date of Conference: 14-16 Oct. 2011 Page(s): 792 � 795
[26] Shen, T.W. ; Dept. of Biomed. Eng., Wisconsin Univ., Madison, WI, USA ; Tompkins, W.J. ; Hu, Y.H. �One-lead ECG for identity verification� Published in: Engineering in Medicine and Biology, 2002. 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society EMBS/BMES Conference, 2002. Proceedings of the Second Joint (Volume:1 ) Date of Conference: 2002 Page(s): 62 - 63 vol.1
[27] Do Hoon Kim ; Korea Univ., Seoul ; Taek Lee ; Jung, S.-O.D. ; Hoh Peter In more authors, �Cyber Threat Trend Analysis Model Using HMM� Published in: Information Assurance and Security, 2007. IAS 2007. Third International Symposium on Date of Conference: 29-31 Aug. 2007 Page(s): 177 � 182
[28] Zhou Yanbing ; North China Electr. Power Univ., Beijing, China ; Liu Yibing ; Xin Weidong ; Wei Ruiyan, �Trend analysis for gear pitting fault based on the non-Gaussian characteristic� Published in: Intelligent Control and Information Processing (ICICIP), 2011 2nd International Conference on (Volume:2 ) Date of Conference: 25-28 July 2011 Page(s): 1144 � 1148
[29] Trevisan, B. ; Textlinguistics/ Tech., Commun., RWTH Aachen Univ., Aachen, Germany ; Erasme, D. ; Jakobs, E.-M. �Web comment-based trend analysis on deep geothermal energy� Published in: Professional Communication Conference (IPCC), 2013 IEEE International Date of Conference: 15-17 July 2013 Page(s): 1 � 8
[30] Jianguo Cui ; Sch. of Autom., Shenyang Aerosp. Univ., Shenyang, China ; Jianqiang Shi ; Shiliang Dong ; Liying Jiang more authors, �The condition trend analysis of aircraft key components based on D-S evidence theory� Published in: Control and Decision Conference (CCDC), 2012 24th Chinese Date of Conference: 23-25 May 2012 Page(s): 2264 - 2269