Development of a trustworthy authentication system in mobile ad-hoc networks for disaster area

In this paper, we propose a MANET authentication model for communication between victims in disaster areas. Our model is as secure as the Self-Generated-Certificate Public Key without pairing scheme [1], but does not require a direct connection to a centralized CA. We achieve this by combining two adjusted protocols into two independent authentication modes: main mode and emergency mode. In our scenario, a disaster area is partitioned into two adjacent zones: a damage zone (most infrastructures inside are damaged by a severe disaster), and an infrastructure zone. This partition is based on our observation from many real life disaster situations. A node, called a carrier (rescue node), moves between the two zones in order to relay between them. Our proposed hybrid approach has higher availability and more efficiency than the traditional approaches. In our system, an encrypted message can be used to verify both senders and receivers as well as to preserve confidentiality and integrity of data. The key to the success of our model is the mobility of the rescue nodes. Our model is validated using NS-3 simulator. We present security and efficiency analysis by comparing to the traditional approaches.

[1]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[2]  Matthias Frank,et al.  Human mobility in MANET disaster area simulation - a realistic approach , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[3]  Junzuo Lai,et al.  Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.

[4]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[5]  John M. Brooke,et al.  Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[6]  H. Labiod,et al.  An analysis of ASMA trust evolution in a dense subway environment , 2007, 2007 First International Global Information Infrastructure Symposium.

[7]  Shahrokh Saeednia,et al.  A note on Girault's self-certified model , 2003, Inf. Process. Lett..

[8]  Guang Gong,et al.  Models of Authentications in Ad Hoc Networks and Their Related Network Properties , 2004 .

[9]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[10]  Jaydip Sen A multi-path certification protocol for mobile ad hoc networks , 2009, 2009 4th International Conference on Computers and Devices for Communication (CODEC).