1st International ICST Conference on Communications and Networking in China

Research Article

A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344716,
        author={B.  Moussakhani and S.M. Safavi and  H. Ebrahimzad and A. Ghazisaeidi},
        title={A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain},
        proceedings={1st International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2007},
        month={4},
        keywords={},
        doi={10.1109/CHINACOM.2006.344716}
    }
    
  • B. Moussakhani
    S.M. Safavi
    H. Ebrahimzad
    A. Ghazisaeidi
    Year: 2007
    A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344716
B. Moussakhani1,*, S.M. Safavi1, H. Ebrahimzad1, A. Ghazisaeidi1
  • 1: Amirkabir University of Technology and Iran Telecommunication Research Center(ITRC)
*Contact email: babak.moossakhani@gmail.com

Abstract

In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.