Ad Hoc Network Authentication: A Jini-Based Approach
نویسندگان
چکیده
Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that provides a foundation for secure, ad hoc joins in a distributed, mobile, wireless network. Our approach incorporates the use of a dynamic PKI within a Jini-based architecture. We discuss a Java-based implementation of a certification authority hierarchy that supports our authentication process.
منابع مشابه
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and to permit a user to enter the network and become a client of services without apriori knowledge of either the existence of the network or its services. However, Jini lacks security provisions for authenticating users ...
متن کاملAn Authentication Scheme for a Jini-based Ad Hoc Network
Ad hoc networks provide a low-latency, high bandwidth, and dynamically reconfigurable network infrastructure that can disclose the full potential of the network to the user. Use of Jini technology in an ad hoc environment allows the user to enter a network and become a user of services without apriori knowledge of the existence of the network or its services. However, Jini lacks security provis...
متن کاملCombining Trust Management, Jini, IPv6, and Wireless links: A Proposal for a Service Network Architecture for Ad Hoc Environments Extended Abstract
In this paper, we present a novel communications architecture for future TCP/IP based networks. The architecture aims to provide unified services both at the network and service layers. The architecture is based on decentralized trust management, IPv6, and Jini. The aim of the architecture is to support infrastructureless operations. The desired features can be summarized into the next five req...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملAuthentication in a layered security approach for mobile ad hoc networks
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered s...
متن کامل