Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks

Access control AAA infrastructures are traditionally used by the service providers so as to charge their subscribers. Given the easiness and the cheapness of MANET deployment and provided that charging is possible, service providers are likely to offer their services over MANET. In previous works [1] and [2], we presented a distributed AAA framework for MANET. We propose to evaluate the runtime of this framework authentication protocol by modeling and simulating typical cases that are fairly representative of the reality and can easily be extended.

[1]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[2]  Hakima Chaouchi,et al.  Light and distributed AAA scheme for mobile ad-hoc networks , 2008 .

[3]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[4]  Jakob Jonsson,et al.  Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.

[5]  Kevin R. Fall,et al.  The NS Manual (Formerly NS Notes and Documentation , 2002 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[8]  M. Laurent-Maknavicius,et al.  Protocols for Distributed AAA Framework in Mobile Ad-hoc Networks , 2009 .

[9]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[10]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[11]  Marc Stevens,et al.  Creating a rogue CA certificate , 2008 .

[12]  R. Fisher The Advanced Theory of Statistics , 1943, Nature.

[13]  W. Beyer CRC Standard Probability And Statistics Tables and Formulae , 1990 .

[14]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[15]  Patrick Th. Eugster,et al.  DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[16]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[17]  M. Kendall,et al.  The advanced theory of statistics , 1945 .

[18]  Robbert van Renesse,et al.  COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].