Abstract
The security deployment in mobile ad hoc networks is frequently hampered by resource constraints. The current routing systems of mobile ad hoc networks deploy very weak security techniques in order to copy with the computational overhead and bandwidth consumption. In this paper, we present an ID-based online/offline signature scheme which provides a full scale of security with sound performance. We show that our scheme is secure against existential forgery under adaptive chosen message attacks.
Chapter PDF
Similar content being viewed by others
References
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the First Annual Conference on Computer and Communications Security. ACM, New York (1993)
Cha, J., Cheon, J.: An identity-based signature from gap-diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 1–24. Springer, Heidelberg (2002)
Boneh, D., Lynn, B., Shacham, H.: Short signature fromt eht weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Glodwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17, 281–308 (1988)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking, Mobicom 2002 (2002)
Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) (2004)
Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-Demand Distance Vector (AODV) Routing (2003)
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13, 361–396 (2000)
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing (2004)
Zhang, F., Mu, Y., Susilo, W.: Reducing security overhead for mobile networks. In: Proceedings of The 19th International Conference on Advanced Information Networking and Applications (AINA 2005), pp. 398–403. IEEE Computer Society, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, S., Mu, Y., Susilo, W. (2005). Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_88
Download citation
DOI: https://doi.org/10.1007/11596042_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)