An Authentication Scheme for a Jini-based Ad Hoc Network

نویسنده

  • M. M. McMahon
چکیده

Ad hoc networks provide a low-latency, high bandwidth, and dynamically reconfigurable network infrastructure that can disclose the full potential of the network to the user. Use of Jini technology in an ad hoc environment allows the user to enter a network and become a user of services without apriori knowledge of the existence of the network or its services. However, Jini lacks security provisions for entry into the network. This paper presents an algorithm that provides a foundation for secure, ad hoc joining of a distributed, mobile, wireless network based on Jini architecture. We also present the description of a Java-based implementation of certification authority hierarchy to support the authentication process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of a Jini-based Ad Hoc Network Authentication Scheme

Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and to permit a user to enter the network and become a client of services without apriori knowledge of either the existence of the network or its services. However, Jini lacks security provisions for authenticating users ...

متن کامل

Ad Hoc Network Authentication: A Jini-Based Approach

Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that pr...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Capacity Enhancement of Ad Hoc Networks using a New Beamforming Scheme Based on ESPAR

This paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (ESPAR). The proposed method is capable of providing better capacity compared to the conventional ESPAR. The termination of each antenna element in this structure comprises a PIN diode in addition to a varactor. Using PIN diode besides the varactor provides more degrees of freed...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002