Abstract
Moon and Lee recently designed an authentication protocol for an ad hoc network using an identifier [Mathematical and Computer Modelling]. The main contribution of this method is that it can effectively reduce the authentication overheads compared with related works. Unfortunately, we have found that the authentication protocol has suffered from the man-in-the-middle attack.
Original language | English (US) |
---|---|
Pages (from-to) | 1572-1575 |
Number of pages | 4 |
Journal | Mathematical and Computer Modelling |
Volume | 57 |
Issue number | 5-6 |
DOIs | |
State | Published - Mar 2013 |
Externally published | Yes |
Keywords
- Ad hoc network
- Authentication
- Identifier
ASJC Scopus subject areas
- Modeling and Simulation
- Computer Science Applications