Home > Archive > 2015 > Volume 5 Number 5 (Oct. 2015) >
IJMLC 2015 Vol.5(5): 374-378 ISSN: 2010-3700
DOI: 10.7763/IJMLC.2015.V5.536

Independent Authentication Protocol in Tactical Network Environment Using Hash Lock Approach

Jin-suk Kang

Abstract—Ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

Index Terms—Tactical network environment, hash lock approach, hash function, sensor network.

Jin-suk Kang is with Jangwee Research Institute for National Defence, Ajou University, San 5, Woncheon-dong, Yeongtong-gu, Suwon 443-749, Republic of Korea (e-mail: jskang01@ajou.ac.kr).

[PDF]

Cite: Jin-suk Kang, "Independent Authentication Protocol in Tactical Network Environment Using Hash Lock Approach," International Journal of Machine Learning and Computing vol.5, no. 5, pp. 374-378, 2015.

General Information

  • E-ISSN: 2972-368X
  • Abbreviated Title: Int. J. Mach. Learn.
  • Frequency: Quaterly
  • DOI: 10.18178/IJML
  • Editor-in-Chief: Dr. Lin Huang
  • Executive Editor:  Ms. Cherry L. Chen
  • Abstracing/Indexing: Inspec (IET), Google Scholar, Crossref, ProQuest, Electronic Journals LibraryCNKI.
  • E-mail: ijml@ejournal.net


Article Metrics in Dimensions