International Journal of Computer Applications
An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized. Distributed network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a distributed network like ad hoc networks are deployed in untrusted environments. Therefore, authentication is a pioneer to any secure interactions in these networks.