Skip to main content

Context-Enhanced Authentication for Infrastructureless Network Environments

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

  • 629 Accesses

Abstract

Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Neuman, B., Ts’o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9), 33–38 (1994)

    Article  Google Scholar 

  2. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1989)

    Article  MathSciNet  Google Scholar 

  3. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002, pp. 567–574 (2002)

    Google Scholar 

  4. Ingemarsson, I., Simmons, G.: A Protocol to Set Up Shared Secret Schemes Without the Assitance of a Mutually Trusted Third Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 266–282. Springer, Heidelberg (1991)

    Google Scholar 

  5. Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: Proceedings of the 28th Annual Symposium on the Foundations of Computer Science, pp. 427–437. IEEE, Los Alamitos (1987)

    Google Scholar 

  6. Hertzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)

    Google Scholar 

  7. Pirzada, A., McDonald, C.: Kerberos Assisted Authentication in Mobile Ad Hoc Networks. In: 27th Australiasian Computer Science Conference (2004)

    Google Scholar 

  8. Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Networks 13(6), 24–30 (1999)

    Article  Google Scholar 

  9. Saxena, N., Tsudik, G., Yi, J.: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. In: IEEE Conference on Networking Protocols (ICNP) (2005)

    Google Scholar 

  10. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)

    Article  Google Scholar 

  11. Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2005), pp. 59–64 (2005)

    Google Scholar 

  12. Covington, M.: A Flexible Security Architecture for Pervasive Computing Environments. PhD thesis, College of Computing, Georgia Institute of Technology (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wishart, R., Indulska, J., Portmann, M., Sutton, P. (2006). Context-Enhanced Authentication for Infrastructureless Network Environments. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_94

Download citation

  • DOI: https://doi.org/10.1007/11833529_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics