An Authentication Scheme for a Jini-based Ad Hoc Network
نویسنده
چکیده
Ad hoc networks provide a low-latency, high bandwidth, and dynamically reconfigurable network infrastructure that can disclose the full potential of the network to the user. Use of Jini technology in an ad hoc environment allows the user to enter a network and become a user of services without apriori knowledge of the existence of the network or its services. However, Jini lacks security provisions for entry into the network. This paper presents an algorithm that provides a foundation for secure, ad hoc joining of a distributed, mobile, wireless network based on Jini architecture. We also present the description of a Java-based implementation of certification authority hierarchy to support the authentication process.
منابع مشابه
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and to permit a user to enter the network and become a client of services without apriori knowledge of either the existence of the network or its services. However, Jini lacks security provisions for authenticating users ...
متن کاملAd Hoc Network Authentication: A Jini-Based Approach
Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that pr...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملCapacity Enhancement of Ad Hoc Networks using a New Beamforming Scheme Based on ESPAR
This paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (ESPAR). The proposed method is capable of providing better capacity compared to the conventional ESPAR. The termination of each antenna element in this structure comprises a PIN diode in addition to a varactor. Using PIN diode besides the varactor provides more degrees of freed...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002