Chapter 17

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Seonho Choi1, Kun Sun2 and Hyeonsang Eom3,    1Bowie State University, Bowie, MD, USA,    2George Mason University, Fairfax, VA, USA,    3Seoul National University, Seoul, Korea

In wireless ad hoc networks, most of the authentication protocols assume a single source of trust. However, in the presence of multiple trust sources (called source group in this chapter), it becomes difficult to design resource- (or energy-) efficient authentication protocols, especially for multicast/broadcast services, utilizing multiple trust sources at the same time. Some traditional authentication approaches may be extended and used for this purpose. However, the communication ...

Get Emerging Trends in ICT Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.