An Authentication Architecture for Collaboration among Agents in Ad Hoc Networks

Yasukuni Okataku, Nobukazu Yoshioka, Shinichi Honiden

Research output: Contribution to journalArticle

Abstract

This paper proposes an authentication architecture for collaboration among agents in a network environment without security assurance. The architecture requires that there should exist at least one secure node (oasis node). The oasis node generates the same number of authentication codes as the number of objects of authentication, using random numbers and agent information, and distributes the codes among the agents. The agents gather at the specified oasis node and obtain verification by the oasis node, based on the distributed random value and the authentication code. In the authentication architecture proposed in this paper, the random number and the authentication code are publicized information which can be compromised by eavesdropping. But the algorithm for generation and verification of the authentication code is not publicized. The architecture is suited for handling authentication processing in ad hoc collaboration among an unspecified number of agents.

Original languageEnglish
Pages (from-to)11-19
Number of pages9
JournalElectronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)
Volume87
Issue number5
DOIs
Publication statusPublished - 2004 May 1
Externally publishedYes

Fingerprint

Ad hoc networks
Authentication
Processing

Keywords

  • Ad hoc network
  • Agent
  • Authentication
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

@article{7c100ec9e06b4976ba440280ca3e4a2d,
title = "An Authentication Architecture for Collaboration among Agents in Ad Hoc Networks",
abstract = "This paper proposes an authentication architecture for collaboration among agents in a network environment without security assurance. The architecture requires that there should exist at least one secure node (oasis node). The oasis node generates the same number of authentication codes as the number of objects of authentication, using random numbers and agent information, and distributes the codes among the agents. The agents gather at the specified oasis node and obtain verification by the oasis node, based on the distributed random value and the authentication code. In the authentication architecture proposed in this paper, the random number and the authentication code are publicized information which can be compromised by eavesdropping. But the algorithm for generation and verification of the authentication code is not publicized. The architecture is suited for handling authentication processing in ad hoc collaboration among an unspecified number of agents.",
keywords = "Ad hoc network, Agent, Authentication, Security",
author = "Yasukuni Okataku and Nobukazu Yoshioka and Shinichi Honiden",
year = "2004",
month = "5",
day = "1",
doi = "10.1002/ecja.10165",
language = "English",
volume = "87",
pages = "11--19",
journal = "Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)",
issn = "8756-6621",
publisher = "John Wiley and Sons Inc.",
number = "5",

}

TY - JOUR

T1 - An Authentication Architecture for Collaboration among Agents in Ad Hoc Networks

AU - Okataku, Yasukuni

AU - Yoshioka, Nobukazu

AU - Honiden, Shinichi

PY - 2004/5/1

Y1 - 2004/5/1

N2 - This paper proposes an authentication architecture for collaboration among agents in a network environment without security assurance. The architecture requires that there should exist at least one secure node (oasis node). The oasis node generates the same number of authentication codes as the number of objects of authentication, using random numbers and agent information, and distributes the codes among the agents. The agents gather at the specified oasis node and obtain verification by the oasis node, based on the distributed random value and the authentication code. In the authentication architecture proposed in this paper, the random number and the authentication code are publicized information which can be compromised by eavesdropping. But the algorithm for generation and verification of the authentication code is not publicized. The architecture is suited for handling authentication processing in ad hoc collaboration among an unspecified number of agents.

AB - This paper proposes an authentication architecture for collaboration among agents in a network environment without security assurance. The architecture requires that there should exist at least one secure node (oasis node). The oasis node generates the same number of authentication codes as the number of objects of authentication, using random numbers and agent information, and distributes the codes among the agents. The agents gather at the specified oasis node and obtain verification by the oasis node, based on the distributed random value and the authentication code. In the authentication architecture proposed in this paper, the random number and the authentication code are publicized information which can be compromised by eavesdropping. But the algorithm for generation and verification of the authentication code is not publicized. The architecture is suited for handling authentication processing in ad hoc collaboration among an unspecified number of agents.

KW - Ad hoc network

KW - Agent

KW - Authentication

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=1142288186&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=1142288186&partnerID=8YFLogxK

U2 - 10.1002/ecja.10165

DO - 10.1002/ecja.10165

M3 - Article

AN - SCOPUS:1142288186

VL - 87

SP - 11

EP - 19

JO - Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)

JF - Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)

SN - 8756-6621

IS - 5

ER -