Wireless Group Authentication
Entities in wireless networks are always organized into group for network managers’ convenience. Group authentication is the entity identification strategy based on the identities or features of the wireless entities. Owing to the group structure, group authentication is very suitable for wireless networks. In addition, group authentication is one of the most important technologies for wireless communication in that network.
Group authentication is developed to provide better security for group-oriented network. In a wireless group-oriented network, there are multiple entities wanting to form a private network to exchange messages. In order to protect the exchanged messages, every entity in the network should authenticate others. According to the centralized authentication (CA) server’s participation, group authentication schemes can be divided into three types: CA-centric type, entity-centric type, and...
- Ateniese G, Steiner M, Tsudik G (1998) Authenticated group key agreement and friends. In: Proceedings of the 5th ACM conference on computer and communications security. ACM, New York, NY, pp 17–26Google Scholar
- Bhakti MAC, Abdullah A, Jung LT (2007) Eap-based authentication for ad hoc network. In: Seminar Nasional Aplikasi Teknologi Informasi (SNATI)Google Scholar
- Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Symposium on security and privacy. IEEE, Washington, DC, pp 197–213Google Scholar
- Craiger JP et al (2002) 802.11, 802.1x, and wireless security. SANS Institute InfoSec Reading RoomGoogle Scholar
- Perrig A, Canetti R, Tygar JD, Song D (2005) The tesla broadcast authentication protocol. Rsa Cryptobytes 5Google Scholar
- Wang CL, Horng G, Chen YS, Hong TP (2006) An efficient key-update scheme for wireless sensor networks. In: International conference on computational science. Springer, Berlin/Heidelberg, pp 1026–1029Google Scholar