A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation

In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.

[1]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[2]  P. Caballero-Gil,et al.  Efficient Public Key Certificate Management for Mobile Ad Hoc Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[3]  Hisham Dahshan,et al.  A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem , 2010, 2010 8th Annual Communication Networks and Services Research Conference.

[4]  Shivakant Mishra,et al.  Enhancing Base Station Security in Wireless Sensor Networks , 2003 .

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[7]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[8]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[9]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[10]  Soumyadev Maity,et al.  Membership Models and the Design of Authentication Protocols for MANETs , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[11]  Y. V. Joshi,et al.  Efficient public key authentication in MANET , 2009, ICAC3 '09.

[12]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[15]  Martina Zitterbart,et al.  Security in Sensor Networks , 2010, it Inf. Technol..

[16]  Ze Wang,et al.  A Certificateless Key Management Scheme in Mobile Ad Hoc Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[17]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..