HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2013 | Volume: 13 | Issue: 16 | Page No.: 3320-3324
DOI: 10.3923/jas.2013.3320.3324
Application of Direct Anonymous Attestation to the Ad Hoc Networks Security
Tao Zhang and Shuai Ren

Abstract: As Ad Hoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Direct Anonymous Attestation theory will be imported into Ad Hoc networks based on researching the Ad Hoc network. To optimize authentication link of the Ad Hoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Ad Hoc nodes security issues, thus raising the Ad Hoc network against attacks.

Fulltext PDF

How to cite this article
Tao Zhang and Shuai Ren, 2013. Application of Direct Anonymous Attestation to the Ad Hoc Networks Security. Journal of Applied Sciences, 13: 3320-3324.

Keywords: Network security, ad hoc network, direct anonymous attestation and zero-knowledge proof

REFERENCES

  • Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
    CrossRef    Direct Link    


  • Chim, T.W., S.M. Yiu, L.C. Hui and V.O. Li, 2011. PASS: Privacy-preserving authentication scheme for smart grid network. Proceedings of the IEEE International Conference on Smart Grid Communications, October 17-20, 2011, Brussels, Belgium , pp: 196-201.


  • Catalano, D., M. Di Raimondo, D. Fiore and M. Messina, 2011. Zero-knowledge sets with short proofs. IEEE Trans. Inform. Theory, 57: 2488-2502.
    CrossRef    


  • Day, J.N., T.T.H. Chau, M. Wolbers, P.P. Mai and N.T. Dung et al., 2013. Combination antifungal therapy for cryptococcal meningitis. N. Engl. J. Med., 368: 1291-1302.
    CrossRef    


  • Li, F. and Y. Wang, 2007. Routing in vehicular ad hoc networks: A survey. IEEE Veh. Technol. Mag., 2: 12-22.
    CrossRef    Direct Link    


  • Gros, J., R. Ostrovsky and A. Sahai, 2012. New techniques for noninteractive aero-knowledge. J. ACM, Vol. 59.
    CrossRef    


  • He, D., J. Bu, S. Chan, C. Chen and M. Yin, 2011. Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans. Wireless Commun., 10: 431-436.
    CrossRef    


  • Kale, M.R.A., S.R. Gupta and R.B. Prmit, 2013. An overview of manet ad hoc network. Int. J. Comput. Sci. Appl., 6: 223-227.
    Direct Link    


  • Othman, H., H. Hashim and J.L. Ab Manan, 2010. A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS). Proceedings of the International Conference on Internet Technology and Secured Transactions, November 8-11, 2010, London, UK., pp: 1-7.


  • Zheng, R. and R. Kravets, 2005. On-demand power management for ad hoc networks. Ad Hoc Networks, 3: 51-68.
    CrossRef    Direct Link    


  • Shen, Z. and Q. Tong, 2010. The security of cloud computing system enabled by trusted computing technology. Proceedings of the 2nd International Conference on Signal Processing Systems, Volume 2, July 5-7, 2010, Dalian, China, pp: V2-11-V2-15.


  • Xue, X. and J. Ding, 2012. LPA: A new location‐based privacy‐preserving authentication protocol in VANET. Secur. Commun. Networks, 5: 69-78.
    CrossRef    


  • Yeh, L.Y., Y.C. Chen and J.L. Huang, 2011. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Comput. Commun., 34: 447-456.
    CrossRef    

  • © Science Alert. All Rights Reserved