An Identity-Based Network Access Control Scheme for Single Authority MANETs

Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of how securely extend the network. In this paper, we present INAC, an identity-based network access control scheme for MANETs. In INAC, each node in the network must have an identity-based membership token in order to take part in network activities. Membership tokens have special formats, which not only guarantee security of non-compromised nodes, but also enable that nodes obtain identity-based membership tokens based on their trustworthiness. Through simulations we verify the feasibility of our design in the single authority MANETs.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Alexandra Boldyreva,et al.  Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .

[3]  Jeong Hyun Yi,et al.  Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.

[4]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[5]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[8]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[9]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[10]  Diana K. Smetters,et al.  Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Jeong Hyun Yi,et al.  Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.

[12]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Muthucumaru Maheswaran,et al.  A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[15]  Krste Asanovic,et al.  Energy Aware Lossless Data Compression , 2003, MobiSys.

[16]  Gene Tsudik,et al.  Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[17]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[18]  Jeong Hyun Yi,et al.  Access control in ad hoc groups , 2004, 2004 International Workshop on Hot Topics in Peer-to-Peer Systems.

[19]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[20]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[22]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[23]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.