Author:
Abouaroek Musaeed,Ahmad Khaleel
Abstract
The demand for using wireless paradigms for performing various information and communication operations has been exploded. The opportunistic networks is a special type of delay tolerant networks proposed to operate in an emergency manner to facilitate mobile connectivity between the nodes when there is no connectivity. These emergencies are caused either by human-made or natural disasters. Opportunistic Networks depend on mobile phones and other mobile devices that carry wireless technology. This paper is an attempt to expand the opportunistic network through the authentication nodes. We propose an NTRU algorithm for node authentication in opportunistic networks .NTRU algorithm is an asymmetric post-quantum cryptosystem. This algorithm is unbreakable and robust compared to RSA and ECC cryptosystem.
Publisher
Scalable Computing: Practice and Experience
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献