Ad Hoc Network Authentication: A Jini-Based Approach

نویسندگان

  • D. M. Needham
  • M. M. McMahon
  • J. B. Datko
چکیده

Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that provides a foundation for secure, ad hoc joins in a distributed, mobile, wireless network. Our approach incorporates the use of a dynamic PKI within a Jini-based architecture. We discuss a Java-based implementation of a certification authority hierarchy that supports our authentication process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of a Jini-based Ad Hoc Network Authentication Scheme

Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and to permit a user to enter the network and become a client of services without apriori knowledge of either the existence of the network or its services. However, Jini lacks security provisions for authenticating users ...

متن کامل

An Authentication Scheme for a Jini-based Ad Hoc Network

Ad hoc networks provide a low-latency, high bandwidth, and dynamically reconfigurable network infrastructure that can disclose the full potential of the network to the user. Use of Jini technology in an ad hoc environment allows the user to enter a network and become a user of services without apriori knowledge of the existence of the network or its services. However, Jini lacks security provis...

متن کامل

Combining Trust Management, Jini, IPv6, and Wireless links: A Proposal for a Service Network Architecture for Ad Hoc Environments Extended Abstract

In this paper, we present a novel communications architecture for future TCP/IP based networks. The architecture aims to provide unified services both at the network and service layers. The architecture is based on decentralized trust management, IPv6, and Jini. The aim of the architecture is to support infrastructureless operations. The desired features can be summarized into the next five req...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Authentication in a layered security approach for mobile ad hoc networks

An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003