An efficient anonymous authentication mechanism for delay tolerant networks

  • Renwang Su*
  • , Zhenfu Cao
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.

Original languageEnglish
Pages (from-to)435-441
Number of pages7
JournalComputers and Electrical Engineering
Volume36
Issue number3
DOIs
StatePublished - May 2010
Externally publishedYes

Keywords

  • Anonymous authentication
  • Delay tolerant network
  • Security

Fingerprint

Dive into the research topics of 'An efficient anonymous authentication mechanism for delay tolerant networks'. Together they form a unique fingerprint.

Cite this