An authentication architecture for collaboration among agents in ad hoc networks

This paper proposes an authentication architecture for collaboration among agents in a network environment without security assurance. The architecture requires that there should exist at least one secure node (oasis node). The oasis node generates the same number of authentication codes as the number of objects of authentication, using random numbers and agent information, and distributes the codes among the agents. The agents gather at the specified oasis node and obtain verification by the oasis node, based on the distributed random value and the authentication code. In the authentication architecture proposed in this paper, the random number and the authentication code are publicized information which can be compromised by eavesdropping. But the algorithm for generation and verification of the authentication code is not publicized. The architecture is suited for handling authentication processing in ad hoc collaboration among an unspecified number of agents. © 2004 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 87(5): 11–19, 2004; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.10165

[1]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[2]  Walter Binder,et al.  Portable Resource Control in Java: Application to Mobile Agent Security , 2002, SEMAS.

[3]  Hilarie K. Orman,et al.  The OAKLEY Key Determination Protocol , 1997, RFC.

[4]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[5]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[6]  Volker Roth Programming Satan's Agents , 2001, Electron. Notes Theor. Comput. Sci..

[7]  Walter Binder Design and implementation of the J-SEAL2 mobile agent kernel , 2001, Proceedings 2001 Symposium on Applications and the Internet.