Subscribe Now Subscribe Today
Research Article

Application of Direct Anonymous Attestation to the Ad Hoc Networks Security

Tao Zhang and Shuai Ren
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

As Ad Hoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Direct Anonymous Attestation theory will be imported into Ad Hoc networks based on researching the Ad Hoc network. To optimize authentication link of the Ad Hoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Ad Hoc nodes security issues, thus raising the Ad Hoc network against attacks.

Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

  How to cite this article:

Tao Zhang and Shuai Ren, 2013. Application of Direct Anonymous Attestation to the Ad Hoc Networks Security. Journal of Applied Sciences, 13: 3320-3324.

DOI: 10.3923/jas.2013.3320.3324


1:  Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef  |  Direct Link  |  

2:  Chim, T.W., S.M. Yiu, L.C. Hui and V.O. Li, 2011. PASS: Privacy-preserving authentication scheme for smart grid network. Proceedings of the IEEE International Conference on Smart Grid Communications, October 17-20, 2011, Brussels, Belgium , pp: 196-201.

3:  Catalano, D., M. Di Raimondo, D. Fiore and M. Messina, 2011. Zero-knowledge sets with short proofs. IEEE Trans. Inform. Theory, 57: 2488-2502.
CrossRef  |  

4:  Day, J.N., T.T.H. Chau, M. Wolbers, P.P. Mai and N.T. Dung et al., 2013. Combination antifungal therapy for cryptococcal meningitis. N. Engl. J. Med., 368: 1291-1302.
CrossRef  |  

5:  Li, F. and Y. Wang, 2007. Routing in vehicular ad hoc networks: A survey. IEEE Veh. Technol. Mag., 2: 12-22.
CrossRef  |  Direct Link  |  

6:  Gros, J., R. Ostrovsky and A. Sahai, 2012. New techniques for noninteractive aero-knowledge. J. ACM, Vol. 59. 10.1145/2220357.2220358

7:  He, D., J. Bu, S. Chan, C. Chen and M. Yin, 2011. Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans. Wireless Commun., 10: 431-436.
CrossRef  |  

8:  Kale, M.R.A., S.R. Gupta and R.B. Prmit, 2013. An overview of manet ad hoc network. Int. J. Comput. Sci. Appl., 6: 223-227.
Direct Link  |  

9:  Othman, H., H. Hashim and J.L. Ab Manan, 2010. A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). Proceedings of the International Conference on Internet Technology and Secured Transactions, November 8-11, 2010, London, UK., pp: 1-7.

10:  Zheng, R. and R. Kravets, 2005. On-demand power management for ad hoc networks. Ad Hoc Networks, 3: 51-68.
CrossRef  |  Direct Link  |  

11:  Shen, Z. and Q. Tong, 2010. The security of cloud computing system enabled by trusted computing technology. Proceedings of the 2nd International Conference on Signal Processing Systems, Volume 2, July 5-7, 2010, Dalian, China, pp: V2-11-V2-15.

12:  Xue, X. and J. Ding, 2012. LPA: A new location‐based privacy‐preserving authentication protocol in VANET. Secur. Commun. Networks, 5: 69-78.
CrossRef  |  

13:  Yeh, L.Y., Y.C. Chen and J.L. Huang, 2011. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Comput. Commun., 34: 447-456.
CrossRef  |  

©  2021 Science Alert. All Rights Reserved