Authentication Schemes for Open Distributed Network: A Classification

An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized .Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a Distributed Network like ad hoc networks are deployed in untrusted environments. Therefore, authentication is a pioneer to any secure interactions in these networks. Recently, v a r i o u s a u t h e n t i c a t i o n p r o t o c o l s h a ve b e e n proposed for ad hoc networks. In distributed authentication services in ad hoc networks. Two nodes authenticate each other via signed, unforgeable certificates released by a ”virtual“ trusted certification authority. Compared with regular network authentication solutions [28, 29] that rely on physically present, third-party trusted (certification authority) server(s), our design takes a self organized securing approach, in which multiple nodes (say, k) collaboratively serve the role of a certification authority server. Therefore, the authority and functionality of the authentication server are spread to each node’s locality. Any local k nodes are trusted as a whole and collaboratively provide authentication services. This paper describes the authentication procedure and a classification that clarifies similarities and differences among authentication protocol described in the literature. The classification is based upon the role of nodes in the authentication function, establishment of certificate, and type of certificate.

[1]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[2]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[3]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[4]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[6]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[7]  Partha Dasgupta,et al.  Distributed authentication for peer-to-peer networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[8]  Jennifer Seberry,et al.  Proceedings of the Second International Workshop on Information Security , 1997 .

[9]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[10]  Candelaria Hernández-Goya,et al.  Self-organized authentication architecture for Mobile Ad-hoc Networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[11]  Jehan-François Pâris,et al.  Maille Authentication - A Novel Protocol for Distributed Authentication , 2004, SEC.

[12]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[13]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[14]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[15]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Ed Dawson,et al.  Classification of Authentication Protocols: A Practical Approach , 2000, ISW.

[17]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[18]  M.R. Lyu,et al.  An authentication service against dishonest users in mobile ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[19]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[20]  David W. Chadwick Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 , 2002 .

[21]  Banshilal Patidar Intrusion Detection in Wireless Ad Hoc Networks , 2010 .

[22]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[24]  John A. Clark,et al.  A Survey of Authentication Protocol Literature , 2010 .

[25]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[26]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[27]  Dirk Westhoff,et al.  Identity certified authentication for ad-hoc networks , 2003, SASN '03.

[28]  John A. Clark,et al.  A survey of authentication protocol literature: Version 1.0 , 1997 .

[29]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[30]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..