A security and efficiency of authenticated key exchange protocol for wireless Mobile Ad Hoc Networks

Erl Huei Lu*, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Mobile Ad Hoc Networks (MANETs) are infrastructure-free, self-configuring and stand alone wireless networks. Lack of efficient computations and secure based point authentication, the security and efficiency of MANETs have been the biggest challenges in its wide application. Many researchers have applied RSA and ECC cryptography algorithms in building secure ID and key exchange agreement; however, they also have difficult to face the challenges of factoring large composite integers and computing discrete logarithms. Generally, public key infrastructures are assumed to be unavailable in MANETs. The key exchange problem for this type of network has now become important. In this article, we propose a new NTRU-based authenticated key exchange protocol for MANETs. We take advantage of NTRU cryptosystem of the inherent efficiency and security in this type of wireless networks - without any public key infrastructure - to defend message exchange against the threat of session key attacks, the man-in-the-middle attacks and the brute force attacks.

Original languageEnglish
Title of host publicationInnovation for Applied Science and Technology
Pages3280-3284
Number of pages5
DOIs
StatePublished - 2013
Event2nd International Conference on Engineering and Technology Innovation 2012, ICETI 2012 - Kaohsiung, Taiwan
Duration: 02 11 201206 11 2012

Publication series

NameApplied Mechanics and Materials
Volume284-287
ISSN (Print)1660-9336
ISSN (Electronic)1662-7482

Conference

Conference2nd International Conference on Engineering and Technology Innovation 2012, ICETI 2012
Country/TerritoryTaiwan
CityKaohsiung
Period02/11/1206/11/12

Keywords

  • Authentication
  • Key exchange
  • MANETs
  • NTRU

Fingerprint

Dive into the research topics of 'A security and efficiency of authenticated key exchange protocol for wireless Mobile Ad Hoc Networks'. Together they form a unique fingerprint.

Cite this