Skip to main content

A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks

  • Conference paper
Information Networking. Convergence in Broadband and Mobile Networking (ICOIN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3391))

Included in the following conference series:

Abstract

Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most fundamental problem that has to be solved before any others. Some previous solutions requiring centralized entities were not scalable and others requiring physical encounter took a long time. We propose a new architecture, called the Secure Overlay Network (SON), for fully distributed authentication. The SON has scalability because it is constructed in a self-organizing manner. The SON also has NPC-reachability which makes the SON robust against Sybil attacks, and guarantees authentication service between any two nodes in the SON. Both NPC-reachability and simulation results confirm the effectiveness of our architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Hass, Z.J.: Securing Ad Hoc Networks. IEEE Network 12(6), 24–30 (1999)

    Article  Google Scholar 

  2. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE ICNP (2001)

    Google Scholar 

  3. Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad Hoc Networks. In: ACM MobiHoc (2003)

    Google Scholar 

  4. Douceur, J.: The Sybil attack. In: IPTPS (2002)

    Google Scholar 

  5. Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  6. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1999)

    Article  MathSciNet  Google Scholar 

  7. Narasimha, M., Tsudik, G., Yi, J.H.: On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control. In: IEEE ICNP (2003)

    Google Scholar 

  8. Hubaux, J., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: ACM MobiHoc 2001 (2001)

    Google Scholar 

  9. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: ISCC 2002 (2002)

    Google Scholar 

  10. Desmedt, Y.: Threshold cryptography. European Transactions on Telecommunications 5(4), 449–457 (1994)

    Article  MathSciNet  Google Scholar 

  11. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354–371. Springer, Heidelberg (1996)

    Google Scholar 

  12. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: ACM MobiCom (2000)

    Google Scholar 

  13. Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)

    Google Scholar 

  14. Lou, W., Wu, J.: Double-Covered Broadcast (DCB): A Simple Reliable Broadcast Algorithm in MANETs. In: IEEE INFOCOM 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hahm, S., Jung, Y., Yi, S., Song, Y., Chong, I., Lim, K. (2005). A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks. In: Kim, C. (eds) Information Networking. Convergence in Broadband and Mobile Networking. ICOIN 2005. Lecture Notes in Computer Science, vol 3391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30582-8_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30582-8_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24467-7

  • Online ISBN: 978-3-540-30582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics