An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing

Ad-hoc networks are peer-to-peer self- organized networks that make possible the communication between nodes located in areas, where communication infrastructure is absent or difficult to implement. For such networks, security is a crucial issue, since the wireless medium is vulnerable to various attacks. A centralized solution can be easily compromised, leaving the nodes exposed to threats originating from malicious users. In this paper, a security design for Ad-hoc networks is proposed and studied, providing authentication to the nodes that follow the principles of threshold secret sharing.

[1]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[2]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[3]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[4]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[5]  Susan Hansche,et al.  Official (ISC)2 Guide to the CISSP Exam , 2003 .

[6]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[7]  Xiaoyan Hong,et al.  Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[10]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[11]  Roberto Gómez Cárdenas,et al.  Overview the Key Management in Ad Hoc Networks , 2005, ISSADS.

[12]  Robin Kravets,et al.  Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[13]  Sajal K. Das,et al.  A Weight Based Distributed Clustering Algorithm for Mobile ad hoc Networks , 2000, HiPC.

[14]  Lars Klander,et al.  Hacker Proof : The Ultimate Guide to Network Security , 1997 .

[15]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.