11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

Authenticating with Privacy Protection in Opportunistic Networks

Download718 downloads
  • @INPROCEEDINGS{10.4108/eai.19-8-2015.2260862,
        author={Ming-Huang Guo and Horng-Twu Liaw and Meng-Yu Chiu and Li-Ping Tsai},
        title={Authenticating with Privacy Protection in Opportunistic Networks},
        proceedings={11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={IEEE},
        proceedings_a={QSHINE},
        year={2015},
        month={9},
        keywords={opportunistic network privacy protection authentication mechanisms},
        doi={10.4108/eai.19-8-2015.2260862}
    }
    
  • Ming-Huang Guo
    Horng-Twu Liaw
    Meng-Yu Chiu
    Li-Ping Tsai
    Year: 2015
    Authenticating with Privacy Protection in Opportunistic Networks
    QSHINE
    IEEE
    DOI: 10.4108/eai.19-8-2015.2260862
Ming-Huang Guo1,*, Horng-Twu Liaw1, Meng-Yu Chiu1, Li-Ping Tsai1
  • 1: Department of Information Management, Shin-Hsin University
*Contact email: mhguo@mail.shu.edu.tw

Abstract

In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.