Common Contracts

1 similar Mutual Authenticated Key Agreement contracts

Mutual authenticated key agreement in Wireless Infrastructure- less network by Chaotic Maps based Diffie-Helman Property
Mutual Authenticated Key Agreement • October 24th, 2023

Because wireless infrastructure-less networks are dynamic, varied, and scattered, implementing security in them is exceedingly difficult. Authentication is the most crucial prerequisite for security deployment. It is difficult to implement security based on public-key infrastructure with centralized third-party authentication in an environment without infrastructure. We build and test a chaotic map-based technique that handles authentication as one of the key qualities to accomplish security. We allocate the key management responsibility to cluster- heads after dividing the infrastructure-less into several clusters with cluster-heads. The Diffie-Helman property, which is based on Chebyshev polynomials, is used in the proposed work to establish authentication. Our suggested method avoids unnecessary computations like modular exponentiation and elliptical curve scalar multiplications. It also ensures that the secret session-key is only established between the two designated entities and

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!