Self-Organized Authentication Architecture for Mobile Ad-hoc Networks

被引:0
|
作者
Caballero-Gil, P. [1 ]
Caballero-Gil, C. [2 ]
Molina-Gil, J. [2 ]
Hernandez-Goya, C. [1 ]
机构
[1] Univ La Laguna, Dept Stat Operat Res & Comp, Tenerife 38271, Spain
[2] Univ Las Palmas Gran Canaria, Dept Informat & Syst, Las Palmas Gran Canaria 35017, Spain
关键词
Authentication; Access Control; MANETs;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully distributed and self-organized authentication. In this paper apart from describing all the GASMAN components, special emphasis is placed on proving that it fulfils every requirement of a secure distributed authentication scheme, including limited physical protection of broadcast medium, frequent route changes caused by mobility, lack of structured hierarchy, etc. Furthermore, an extensive analysis through simulation experiments in different scenarios is described and discussed.
引用
收藏
页码:208 / +
页数:2
相关论文
共 50 条
  • [41] Trust Integrated Cooperation Architecture for mobile ad-hoc networks
    Balakrishnan, Venkat
    Varadharajan, Vijay
    Tupakula, Uday
    Lucs, Phillip
    [J]. 2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 607 - 611
  • [42] A QoS Architecture Integrating Mobile Ad-Hoc and Infrastructure Networks
    Crisostomo, Sergio
    Sargento, Susana
    Natkaniec, Marek
    Vicari, Norbert
    [J]. 3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [43] An architecture for key management in hierarchical mobile ad-hoc networks
    Rhee, KH
    Park, YH
    Tsudik, G
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (02) : 156 - 162
  • [44] Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks
    Asaeda, Hitoshi
    Rahman, Musfiq
    Manshaei, Mohammad Hossein
    Fukuzawa, Yasuko
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 2205 - 2210
  • [45] A two-step authentication framework in mobile ad-hoc networks
    Komninos, Nikos
    Vergados, Dimitris
    Douligeris, Christos
    [J]. CHINA COMMUNICATIONS, 2007, 4 (01) : 28 - 39
  • [46] An effective trust establishment scheme for authentication in Mobile Ad-Hoc Networks
    Wang, Guojun
    Wang, Qiong
    Ca, Jiannong
    Guo, Minyi
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 749 - +
  • [47] A Two-Step Authentication Framework in Mobile Ad-Hoc Networks
    Nikos Komninos
    Dimitris Vergados
    Christos Douligeris
    [J]. China Communications, 2007, 4 (01) : 28 - 39
  • [48] Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure
    Anita, E. A. Mary
    Vasudevan, V.
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 248 - 256
  • [49] Self-organized behavior based mobility models for ad hoc networks
    Madani, A.
    Moussa, N.
    [J]. Journal of Theoretical and Applied Information Technology, 2012, 39 (02) : 197 - 203
  • [50] Modeling secure connectivity of self-organized wireless ad hoc networks
    Zhang, Chi
    Song, Yang
    Fang, Yuguang
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 825 - 833