Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks

This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering from high packet-loss and node mobility. In order to evaluate the performance of the TSS scheme in a noisy MANET, a number of simulations were carried-out. We concluded that presence of noise inflicts significant reduction in the authentication success ratio (SR) and consequently degrades the performance of the network, while node mobility inflicts no or insignificant effects. The outcomes of these simulations are so important to facilitate efficient network management.

[1]  Dharma P. Agrawal,et al.  Distributed key management for dynamic groups in MANETs , 2008, Pervasive Mob. Comput..

[2]  Tim Howes,et al.  Internet X.509 Public Key Infrastructure LDAPv2 Schema , 1999, RFC.

[3]  Taylor Yu The Kerberos Network Authentication Service (Version 5) , 2007 .

[4]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[5]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[6]  J. J. Garcia-Luna-Aceves,et al.  Non-interactive key establishment in mobile ad hoc networks , 2007, Ad Hoc Networks.

[7]  James F. Epperson,et al.  An Introduction to Numerical Methods and Analysis , 2001 .

[8]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[9]  Zhenfu Cao,et al.  Threshold password authentication against guessing attacks in Ad hoc networks , 2007, Ad Hoc Networks.

[10]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[11]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[12]  Yueh-Min Huang,et al.  A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..

[13]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Deep Medhi,et al.  A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.

[16]  Mohan S. Kankanhalli,et al.  Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.

[17]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[18]  Kwangjo Kim,et al.  Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..

[19]  Jongtack Kim,et al.  Design of certification authority using secret redistribution and multicast routing in wireless mesh networks , 2009, Comput. Networks.

[20]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[21]  Jeong Hyun Yi,et al.  On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[22]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.