A new authentication protocol for revocable anonymity in ad-hoc networks

被引:0
|
作者
Wierzbicki, Adam [1 ]
Zwierko, Aneta [1 ]
Kotulski, Zbigniew [1 ]
机构
[1] Polish Japanese Inst Informat Technol, Warsaw, Poland
关键词
software security; ad-hoc networks; peer-to-peer systems; authentication; revocable anonymity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or need for revocable anonymity. At the same time, an ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds that they have several drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing on established cryptographic primitives (Merkle's puzzles and zero-knowledge proofs) is proposed. The protocol is studied for a model ad-hoc chat application that provides private conversations.
引用
收藏
页码:30 / +
页数:2
相关论文
共 50 条
  • [1] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks
    Hamad, A. M.
    Khedr, W. I.
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
  • [2] Secure and Revocable Node Authentication in Vehicular Ad-Hoc Networks
    Torres, Jenny
    Nogueira, Michele
    Pujolle, Guy
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [3] An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements
    Bhavesh, N. Bharadiya
    Maity, Soumyadev
    Hansdah, R. C.
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (01) : 1 - 14
  • [4] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    Althouse, Bryan
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
  • [5] UGSP: Authentication based secure protocol for ad-hoc networks
    Arora, Neelima
    Shyamasundar, R. K.
    [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 233 - +
  • [6] Recipients' Anonymity in Multihop Ad-Hoc Networks
    Rifa-Pous, Helena
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 181 - 184
  • [7] Practical Identity-Based Authentication Protocol for Ad-hoc Networks
    Feng, Boang
    Liu, Jianwei
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 365 - 368
  • [8] Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks
    Asaeda, Hitoshi
    Rahman, Musfiq
    Manshaei, Mohammad Hossein
    Fukuzawa, Yasuko
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 2205 - 2210
  • [9] Integrating Encryption Technique in Authentication of Multicast Protocol for Ad-Hoc Networks
    Devasia, Tintu
    Visakh, R.
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 423 - 426
  • [10] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    [J]. 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818