An authentication service against dishonest users in mobile ad hoc networks

被引:0
|
作者
Ngai, ECH [1 ]
Lyu, MR [1 ]
Chin, RT [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Shatin, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme.
引用
收藏
页码:1275 / 1285
页数:11
相关论文
共 50 条
  • [1] Detection of Dishonest Trust Recommendations in Mobile Ad Hoc Networks
    Zakirullah
    Islam, M. Hasan
    Khan, Adnan Ahmed
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [2] Multifold node authentication in mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (12) : 1391 - 1406
  • [3] Message authentication scheme for mobile ad hoc networks
    Sato, F
    Takahira, H
    Mizuno, T
    [J]. 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 50 - 56
  • [4] A lightweight authentication protocol for mobile ad hoc networks
    Lu, B
    Pooch, UW
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 546 - 551
  • [5] Decentralized Authentication Mechanism for Mobile Ad hoc Networks
    Khalfaoui, Hafida
    Farchane, Abderrazak
    Saf, Said
    [J]. INFOCOMMUNICATIONS JOURNAL, 2022, 14 (03): : 28 - 34
  • [6] Service discovery in mobile ad hoc networks
    Fan, Z
    Ho, EG
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 457 - 459
  • [7] On service differentiation in mobile Ad Hoc networks
    张顺亮
    叶澄清
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (09) : 81 - 88
  • [8] On service differentiation in mobile Ad Hoc networks
    Zhang S.-L.
    Ye C.-Q.
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (9): : 1087 - 1094
  • [9] Service discovery in mobile ad hoc networks
    Tsai, Hua-Wen
    Chen, Tzung-Shi
    Chu, Chih-Ping
    [J]. INFORMATION NETWORKING: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 186 - 195
  • [10] Quality of service in mobile ad hoc networks
    Li, Wei
    Guizani, Mohsen
    Kazakos, Demetrios
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)