Skip to main content
Log in

An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Ad-hoc networks are peer-to-peer self- organized networks that make possible the communication between nodes located in areas, where communication infrastructure is absent or difficult to implement. For such networks, security is a crucial issue, since the wireless medium is vulnerable to various attacks. A centralized solution can be easily compromised, leaving the nodes exposed to threats originating from malicious users. In this paper, a security design for Ad-hoc networks is proposed and studied, providing authentication to the nodes that follow the principles of threshold secret sharing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chlamtac I., Conti M., Liu J. (2003) Mobile ad-hoc networking: Imperatives and challenges. Ad-hoc Networks Journal 1(1): 13–64

    Article  Google Scholar 

  2. Yang H., Luo H., Ye F., Lu S.W., Zhang L. (2004) Security in mobile ad-hoc networks: Challenges and solutions. IEEE Wireless Communications 11(1): 38–47

    Article  Google Scholar 

  3. Hubaux, J.-P., Buttyan, L., Capkun, S. (2001) The quest for security in mobile ad-hoc networks. In Proceedings of the 2nd ACM International Symposium on Mobile ad hoc networking & computing (MobiHoc’01), October 2001, Long Beach, CA, USA, pp. 146–155.

  4. Zhou L., Haas Z.J. (1999) Securing ad-hoc networks. IEEE Network 13(6): 24–30

    Article  Google Scholar 

  5. Klander, L. (1997). Hacker proof: The ultimate guide to network security. Jamsa Press.

  6. Hansche, S., Berti, J., Hare, C. (2003) Official (ISC) 2 guide to the CISSP exam. Auerbach: (ISC)2 Press

  7. Capkun S. Buttyan L., Hubaux J.-P. (2003) Self-Organized Public-Key Management for Mobile Ad-hoc Networks. IEEE Transactions on Mobile Computing 2(1): 52–64

    Article  Google Scholar 

  8. Yi, S., & Kravets, R. (2002). Key management for heterogeneous ad-hoc wireless networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 202–203.

  9. Kong J., Gu D.L., Gerla M., Lu S. (2002) Adaptive security for multilevel ad-hoc networks. Wireless Communications and Mobile Computing 2(5): 533–547

    Article  Google Scholar 

  10. Gu, D. L., Pei, G., Ly, H., Gerla, M., & Hong, X. (2000). Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs. In Proceedings of the 21st IEEE Century Military Communications Conference (MILCOM), Vol. 1, 2000, pp. 310–314.

  11. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. CRC Press.

  12. Desmedt, Y. (1997). Some recent research aspects of threshold cryptography. In Proceedings of the 1st International Workshop on Information Security, pp. 158–173.

  13. Kong, J., Zerfos, P., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the 9th International Conference on Network Protocols (ICNP’01), pp. 251–260.

  14. The Network Simulator (NS-2), http://www.isi.edu/nsnam/ns/

  15. Chatterjee, M., Das, S. K., & Turgut, D. (2000). A weight based distributed clustering algorithm for mobile ad-hoc networks. In Proceedings of the 7th International Conference on High Performance Computing (HiPC 2000), Dec. 2000, Bangalore, India, LNCS, Vol. 1970, pp. 511–521.

  16. Gruber, I. (2005). Evaluation of ad hoc routing strategies to maximize path lifetimes. In Proceedings of the 14th IST Mobile & Wireless Communications Summit, June 2005, Dresden, Germany.

  17. Gerardo, D. V. T., & Roberto, G. C. (2005). Overview the key management in ad hoc networks. In Advanced Distributed Systems: 5th International School and Symposium (ISSADS’05), January 2005, pp. 397–406.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitrios D. Vergados.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Vergados, D.D., Stergiou, G. An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing. Wireless Pers Commun 43, 1767–1780 (2007). https://doi.org/10.1007/s11277-007-9345-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-007-9345-5

Keywords

Navigation