{"title":"对等感知通信中的混合认证方案","authors":"Yonghun Kim, Joongheon Kim, Sungrae Cho","doi":"10.1109/ICISCT.2017.8188574","DOIUrl":null,"url":null,"abstract":"In this paper, we introduced a novel authentication scheme for peer-aware communication (PAC) networks. PAC devices (PDs) can communicate without infrastructure, because PDs are able to communicate in an ad hoc manner. Due to the absence of infrastructure, there are no certification authorities (CAs) or trusted third parties. Therefore, PDs have to have the ability to authenticate each other even though there is no other help. As the number of PDs grows, the need for authentication will greatly increase.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Hybrid authentication scheme in peer-aware communication\",\"authors\":\"Yonghun Kim, Joongheon Kim, Sungrae Cho\",\"doi\":\"10.1109/ICISCT.2017.8188574\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduced a novel authentication scheme for peer-aware communication (PAC) networks. PAC devices (PDs) can communicate without infrastructure, because PDs are able to communicate in an ad hoc manner. Due to the absence of infrastructure, there are no certification authorities (CAs) or trusted third parties. Therefore, PDs have to have the ability to authenticate each other even though there is no other help. As the number of PDs grows, the need for authentication will greatly increase.\",\"PeriodicalId\":173523,\"journal\":{\"name\":\"2017 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT.2017.8188574\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT.2017.8188574","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hybrid authentication scheme in peer-aware communication
In this paper, we introduced a novel authentication scheme for peer-aware communication (PAC) networks. PAC devices (PDs) can communicate without infrastructure, because PDs are able to communicate in an ad hoc manner. Due to the absence of infrastructure, there are no certification authorities (CAs) or trusted third parties. Therefore, PDs have to have the ability to authenticate each other even though there is no other help. As the number of PDs grows, the need for authentication will greatly increase.