Browse > Article

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network  

Lee Yong (School of Electrical Eng. Cornell University)
Publication Information
Abstract
Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.
Keywords
Randomized CA Group; Mobile Ad Hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Tracy Camp, Jegg Boleng and Vanessa Davies, 'A Survey of Mobility Models for Ad Hoc Networks Research,' Wireless Communication and Mobile Computing (WCMC), vol. 2, no. 5, pp. 483-502, 2002   DOI   ScienceOn
2 Ben Liang and Zygmunt J. Haas, 'Virtual Backbone Generation and Maintenance in Ad Hoc Mobility Management,' IEEE INFOCOM'2000, Tel Aviv, Israel, March, 2000   DOI
3 Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June 1999   DOI
4 J. Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications (ICC) 2003, Anchorage, May 2003   DOI
5 Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, January 2003
6 Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, 'Self-securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002
7 Lidong Zhou and Zygmunt J. Haas, 'Securing Ad hoc network,' IEEE Network Magazine, pp. 24 -30, Nov/Dec 1999   DOI   ScienceOn
8 Zygmunt J. Haas and Ben Liang, 'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999   DOI   ScienceOn
9 Seun Yi and Robin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU -ENG-2002-1717, University of Illinois at Urbana- Champaign, May 2002
10 Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactionson Mobile Computing, Vol. 2, No. 1, pp. 52-64. Jan-Mar 2003   DOI   ScienceOn