Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks

نویسندگان

  • Bartlomiej Sieka
  • Ajay D. Kshemkalyani
چکیده

In this work, we describe a method for establishing authenticated channels in a wireless ad-hoc network. The presented protocol is fully self-organized, and it also provides an identification framework. The two main contributions are (1) a fully self-organized protocol that establishes an authenticated communication channel between nodes of a wireless ad-hoc network and (2) a secure identifier framework that is resilient to impersonation. The authenticated channel provided by the protocol can then be used to establish a secret communication channel between nodes. The authentic identifiers established can be used to associate network (and upper) layer identifiers to prevent spoofing. They can also serve as a reliable basis for reputation management protocols. The paper analyzes the proposed approach in terms of security and complexity (both communication and storage).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks

Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Collaborative Trust - based Secure Routing based Ad - hoc Routing Protocol

The current existing Authenticated Routing for Ad Hoc Networks (ARAN) secure routing protocol is capable of defending itself against most malicious nodes and their different attacks. However, ARAN is not capable of defending itself against any authenticated selfish node participating in the network. Therefore, the objective of my thesis is to make the Authenticated Routing for Ad Hoc Networks s...

متن کامل

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...

متن کامل

Kerberos Assisted Authentication in Mobile Ad-hoc Networks

An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmission power of each node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another. However, this implied trust relationship can be threatened by malicious n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007