Abstract
Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Neuman, B., Ts’o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9), 33–38 (1994)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1989)
Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002, pp. 567–574 (2002)
Ingemarsson, I., Simmons, G.: A Protocol to Set Up Shared Secret Schemes Without the Assitance of a Mutually Trusted Third Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 266–282. Springer, Heidelberg (1991)
Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: Proceedings of the 28th Annual Symposium on the Foundations of Computer Science, pp. 427–437. IEEE, Los Alamitos (1987)
Hertzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Pirzada, A., McDonald, C.: Kerberos Assisted Authentication in Mobile Ad Hoc Networks. In: 27th Australiasian Computer Science Conference (2004)
Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Networks 13(6), 24–30 (1999)
Saxena, N., Tsudik, G., Yi, J.: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. In: IEEE Conference on Networking Protocols (ICNP) (2005)
Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)
Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2005), pp. 59–64 (2005)
Covington, M.: A Flexible Security Architecture for Pervasive Computing Environments. PhD thesis, College of Computing, Georgia Institute of Technology (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wishart, R., Indulska, J., Portmann, M., Sutton, P. (2006). Context-Enhanced Authentication for Infrastructureless Network Environments. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_94
Download citation
DOI: https://doi.org/10.1007/11833529_94
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)