O'Reilly logo

Emerging Trends in ICT Security by Hamid R Arabnia, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Seonho Choi1, Kun Sun2 and Hyeonsang Eom3,    1Bowie State University, Bowie, MD, USA,    2George Mason University, Fairfax, VA, USA,    3Seoul National University, Seoul, Korea

In wireless ad hoc networks, most of the authentication protocols assume a single source of trust. However, in the presence of multiple trust sources (called source group in this chapter), it becomes difficult to design resource- (or energy-) efficient authentication protocols, especially for multicast/broadcast services, utilizing multiple trust sources at the same time. Some traditional authentication approaches may be extended and used for this purpose. However, the communication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required