Self-Organized Authentication in Mobile Ad-Hoc Networks

  • Published : 2009.10.31

Abstract

This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.

Keywords

References

  1. N. Aboudagga, M. Tamer, M. Eltoweissy, L. DaSilva, and J. J. Quisquater, "Authentication protocols for ad-hoc networks: Taxonomy and researchissues," in Proc. 1st ACM international workshop on Quality of service and security in wireless and mobile networks, Oct. 2005
  2. A. Weimεrskirch, "Authentication in ad-hoc and sensor networks," Ph.D. thesis, Ruhr-University Bochum, Germany, July 2004
  3. L. Zhou and Z. Haas, "Securing ad-hoc networks," IEEE Network, vol. 13,pp. 24-30, 1999
  4. H. Luo amd S. Lu, "Ubiquitous and Tobust authentieation services for adhoc wirelcss networks," Department of Computer Science, UCLA, Tech.Rep. TR-200030, 2000
  5. J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, "Adaptive securityfor multi-Ievel ad-hoc networks," J. Wireless Commun. Mobile Comput. ,pp.533-547, 2002
  6. S. Jarecki, N. Saxena, and J. H. Yi, "An attack on the proactive RSA signatureschemε in the URSA ad hoc network acccss control protocol," inProc. ACM Workshop on Secμrity of Ad Hoc and Sensor Networks" 2004,pp.1-9
  7. J. P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobílead-hoc networks," in Proc. MobiHoc, 2001, pp‘146-155
  8. Y. Kím, D. Mazzocchi, and G. Tsudik, "Admission control in peer groups," in Proc. IEEE lnternational Symposium on Network Computing and Applications, 2003
  9. S. Hahrn, Y. Jung, S. Yi, Y. Song, I. Chong, and K. Lim, "A self-organized architecture in mobile ad-hoc networks," in Proc. ICOIN, 2005, pp. 689-696
  10. N. Saxena, G. Tsudik, and J. H. Yi, "Efficient node admission for shortlivedmobile ad-hoc networks," in Proc. ICNP, Nov. 2005, pp. 269-278.
  11. O. Goldreich, S. Micali, and A. Wigderson, "How to prove all NPstatementsin zero-knowledge, and a methodology of cryptographic protocoldesign," in Proc. Crypto, vol. 263, 1986, pp. 171-185
  12. H. Asaeda, M. Rahman, H. Manshaei, and Y. Fukuzawa, "Implementation of group member authentication protocol in mobile ad-hoc lletworks," inProc. WCNC, Las Vegas, USA Apr. 2006
  13. A. Wierzbicki, A. Zwierko, and Z. Kotulski, "A new authentication protocol for revocable anonymity ín ad-hoc networks," in Proc. CNIS, 2005
  14. P. Caballero-Gil and C. Hernandez-Goya, "Zero-knowledge hierarchical authentication in MANETs," IEICE Trans. lnf System Lett., E-89-D,pp.1288-1289, 2006
  15. P. Caballero-Gil and C. Caballεro-Gil, "A global authelltication scheme for mobile ad-hoc networks," in Proc. IWSEC, 2007, pp. 105-120
  16. P. Caballero-Gil, C. Caballero-Gil, J. Molina-Gil, and A. Quesada-Arencibia, "A simulation study of new security schemes in mobile ad-hoc networks," in Proc. EUROCAWT, 2007. pp. 73-81
  17. S. Maki, T. Aura, and M. Hietalathi, "Robust membership management for ad-hoc groups," in Proc. NORDSEC, 2000
  18. D. Glynos, P. Kotzanikolaou, and C. Douligeris, "Preventing impersonation attacks in MANET with multifactor aythentication," in Prco. WIOPT, 2005, pp. 59-64
  19. P. Caballero-Gil and C. Hernandez-Goya, "Strong solutions to the identification problem," in Prco. COCOON, 2001, pp. 257-261
  20. B. Krishnamachari, S. Wicker, R. Bejar and C. Fernandez, "On the complexity of distributes self-configuration in wireless networks," Telecommunication Systems, vol. 22, pp. 33-59, 2002
  21. B. Vandegriend, "Finding hamiltonian cycies: AIgorithms, graphs and performance," M.S. thesis , University of Alberta, Canada, 1998
  22. I. B. Shields, "Hamilton cycie heuristics in hard graphs," Ph.D. thesis,North Carolina State University, 2004
  23. M. Krivelevich and B. Sudakov, "Sparse pseudo-random graphs are Hamiltonian," J. Graph Theory, vol. 42, no. 1, pp. 17-33, 2002 https://doi.org/10.1002/jgt.10065
  24. W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticatedkey exchanges," Designs, Codes and Cryptography, pp. 107-125, 1992
  25. Y. Hao, L. Haiyun, Y. Fan, L. Songwu, and Z. Lixia, "Security in mobilead-hoc networks: Challenges and solutions," Wireless Commun. vol. 11,no.l , pp.38-47, 2004 https://doi.org/10.1109/MWC.2004.1269716
  26. T. Gene, "Some issues in WSN, MANET, and cellular security," in Proc ARO Planning Workshop on Embedded Systems and Network Security, 2007, pp. 22-23
  27. X. Zhao, V. Ganapathy, N. Pissinou, and K. Makki, "Revisiting global timesynchronization," in Proc. IEEE GLOBECOM, 2007, pp. 1058-1063