Self-organized authentication in mobile ad-hoc networks

This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.

[1]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[2]  T. Aura,et al.  Robust Membership Management for Ad-hoc Groups , 2000 .

[3]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[4]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[5]  Niki Pissinou,et al.  Revisiting Global Time Synchronization , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[6]  Gene Tsudik Some Issues in WSN, MANET and Cellular Security , 2007 .

[7]  Pino Caballero-Gil,et al.  A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks , 2007, EUROCAST.

[8]  Candelaria Hernández-Goya,et al.  Zero-Knowledge Hierarchical Authentication in MANETs , 2006, IEICE Trans. Inf. Syst..

[9]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[10]  Benny Sudakov,et al.  Sparse pseudo-random graphs are Hamiltonian , 2003, J. Graph Theory.

[11]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[12]  Ilyoung Chong,et al.  A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks , 2005, ICOIN.

[13]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[14]  Candelaria Hernández-Goya,et al.  Strong Solutions to the Identification Problem , 2001, COCOON.

[15]  Hitoshi Asaeda,et al.  Implementation of group member authentication protocol in mobile ad-hoc networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[16]  Silvio Micali,et al.  How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.

[17]  Pino Caballero-Gil,et al.  A Global Authentication Scheme for Mobile Ad-Hoc Networks , 2007, IWSEC.

[18]  Jeong Hyun Yi,et al.  An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol , 2004, SASN '04.

[19]  Gene Tsudik,et al.  Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[20]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[21]  Basil. Vandegriend,et al.  Finding Hamiltonian cycles: algorithms, graphs and performance , 1998 .

[22]  Adam Wierzbicki,et al.  A new authentication protocol for revocable anonymity in ad-hoc networks , 2005, ArXiv.

[23]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[24]  Jeong Hyun Yi,et al.  Efficient node admission for short-lived mobile ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).

[25]  Stephen B. Wicker,et al.  On the Complexity of Distributed Self-Configuration in Wireless Networks , 2003, Telecommun. Syst..

[26]  André Weimerskirch,et al.  Authentication in ad-hoc and sensor networks , 2004 .

[27]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[28]  Carla D. Savage,et al.  Hamilton cycle heuristics in hard graphs , 2004 .