Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks

被引:0
|
作者
Asaeda, Hitoshi [1 ]
Rahman, Musfiq [2 ]
Manshaei, Mohammad Hossein [3 ]
Fukuzawa, Yasuko [4 ]
机构
[1] Keio Univ, Grad Sch Media & Governance, 5322 Endo, Fujisawa, Kanagawa, Japan
[2] Asian Inst Technol, Pathum Thani, Thailand
[3] INRAI, Planete Res Team, Sophia Antipolis, France
[4] Hitachi Ltd, Syst Dev Lab, Kanagawa, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a mobile ad-hoc network (MANET) architecture, there is no pre-existing fixed network infrastructure, and a mobile node in this network sends data packets to a destination node directly or through its neighbor nodes. This situation is of potential security concern since the neighbor nodes cannot be always trusted. In this paper, we design a group member authentication protocol used in a MANET. It aims to allow a set of nodes to legitimately participate in group communication and then distribute a secret group key to the approved nodes to establish secure communication with group members. Our protocol provides knowledge-based group member authentication, which recognizes a list of secret group keys held in a mobile node as the node's group membership. It employs Zero Knowledge Proof and threshold cryptography. We then introduce our actual implementation and evaluate the behavior to ensure its successful deployment.
引用
收藏
页码:2205 / 2210
页数:6
相关论文
共 50 条
  • [1] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks
    Hamad, A. M.
    Khedr, W. I.
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
  • [2] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [3] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    [J]. NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [4] Authentication Protocol Runtime Evaluation in Distributed AAA Framework for Mobile Ad-Hoc Networks
    Larafa, Sondes
    Laurent, Maryline
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 277 - 281
  • [5] Evaluation of the Multimetric Proactive Routing Protocol Implementation for Mobile Ad-Hoc Networks
    Krygier, Jaroslaw
    Bednarczyk, Mariusz
    Maslanka, Krzysztof
    [J]. 2012 19th International Conference on Microwave Radar and Wireless Communications (MIKON), Vols 1 and 2, 2012, : 259 - 261
  • [6] A lightweight authentication protocol for mobile ad hoc networks
    Lu, B
    Pooch, UW
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 546 - 551
  • [7] An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks
    Dawoud, D. S.
    Mneney, S. H.
    Aghdasi, Farhad
    Dawoud, Peter
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 565 - +
  • [8] A new authentication protocol for revocable anonymity in ad-hoc networks
    Wierzbicki, Adam
    Zwierko, Aneta
    Kotulski, Zbigniew
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 30 - +
  • [9] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    Althouse, Bryan
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
  • [10] A secure routing protocol for mobile ad-hoc networks
    Jiang, TY
    Li, QH
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2825 - 2829