Skip to main content

A Distributed Light-Weight Authentication Model for Ad-hoc Networks

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2001 (ICISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Included in the following conference series:

Abstract

In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commercial transactions. After a brief introduction to the ad-hoc networking paradigm we give a survey of various existing models and analyze them in terms of scope and applications. It is concluded that no appropriate and satisfactory model for low-value transactions in ad-hoc networks has been developed to date. Our new model is derived from previous models dealing with trust and security in ad-hoc networks, and does not require devices with strong processors as public-key systems. We base the model on a recommendation and reference protocol that is inspired by human behavior and that is in accordance with the very nature of ad-hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Abdul-Rahman and S. Hailes. A Distributed Trust Model. New Security Paradigms Workshop 1997, ACM, 1997.

    Google Scholar 

  2. R. Anderson and M. Kuhn. Tamper resistance-a cautionary note. 2nd USENIX Workshop on Electronic Commerce, 1996.

    Google Scholar 

  3. N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications 23, 2000.

    Google Scholar 

  4. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. The 17th Symposium on Security and Privacy, IEEE Computer Society Press, 1996.

    Google Scholar 

  5. L. Buttyán and J.-P. Hubaux. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology-Lausanne, Department of Communication Systems, 2001.

    Google Scholar 

  6. Y. Desmedt and Y. Frankel. Threshold cryptosystems. Advances in Cryptology-Crypto’ 89, LNCS 435, Springer-Verlag, 1990.

    Google Scholar 

  7. R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. Advances in Cryptology-Eurocrypt’ 96, LNCS 1070, Springer-Verlag, 1996.

    Google Scholar 

  8. G. Horn and B. Preneel. Authentication and Payment in Future Mobile Systems. Computer Security-ESORICS’ 98, LNCS 1485, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  9. J.-P. Hubaux, L. Buttyán, and S. Čapkun. The Quest for Security in Mobile Ad Hoc Networks. ACM Symposium on Mobile Ad Hoc Networking and Computing-MobiHOC 2001, 2001.

    Google Scholar 

  10. HiperLAN2 Global Forum. URL: http://www.hiperlan2.com. Work in progress.

  11. IEEE Computer Society LAN/MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-IEEE 802.11. 1997.

    Google Scholar 

  12. A. Jøsang. The right type of trust for distributed systems. New Security Paradigms Workshop 1996, ACM, 1996.

    Google Scholar 

  13. J. Jubin and J.D. Tornow. The DARPRA Packet Radio Network Protocol. Proc. IEEE, vol. 75, no. 1, 1987.

    Google Scholar 

  14. A. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997.

    Google Scholar 

  15. Mobile Ad-hoc Networks (MANET). URL: http://www.ietf.org/html.charters/manet-charter.html. Work in progress.

  16. F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. The 7th International Workshop on Security Protocols, LNCS 1796, Springer-Verlag, 1999.

    Google Scholar 

  17. F. Stajano. The Resurrecting Duckling-what next? The 8 th International Workshop on Security Protocols, LNCS 2133, Springler-Verlag, 2000.

    Google Scholar 

  18. B. Warneke, M. Last, B. Leibowitz, and K.S.J. Pister. Smart Dust: Communicating with a Cubic-Millimeter Computer. Computer Magazine, IEEE, Jan. 2001.

    Google Scholar 

  19. D. Watts and S. Strogatz. Collective dynamics of’ small-world’ networks. Nature 393, 1998.

    Google Scholar 

  20. L. Zhou and Z.J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no. 6, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weimerskirch, A., Thonet, G. (2002). A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_26

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics