Lightweight Integrated Authentication for Tactical MANETs

Tactical mobile ad hoc networks (MANETs) impose special challenges for designing authentication schemes because of the hostile environments in which they may operate. In this paper, we propose a lightweight integrated authentication (LIA) scheme for tactical MANETs. Our proposal is a lightweight and efficient solution that is suitable for use in tactical MANETs because it has the following features: 1) integration of user-to-device authentication and device-to-network authentication 2) trust-enhanced routing table and 3) distributed revocation authority.

[1]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Chunming Rong,et al.  Identity-based key agreement and encryption for wireless sensor networks , 2006 .

[3]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[4]  Mario Gerla,et al.  From battlefields to urban grids: New research challenges in ad hoc wireless networks , 2005, Pervasive Mob. Comput..

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[7]  M. McLoone,et al.  Novel Authenticated Key Management Framework for Ad Hoc Network Security , 2006 .

[8]  Guang Gong,et al.  Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks , 2006, ADHOC-NOW.

[9]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[10]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[13]  Helen Tang,et al.  Strong Authentication for Tactical Mobile Ad Hoc Networks , 2007 .

[14]  Anish Arora,et al.  Secret instantiation in ad-hoc networks , 2006, Comput. Commun..

[15]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[16]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[17]  Kamesh Namuduri,et al.  Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..

[18]  Kenneth G. Paterson,et al.  A comparison between traditional public key infrastructures and identity-based cryptography , 2003, Inf. Secur. Tech. Rep..