An authentication service against dishonest users in mobile ad hoc networks

被引:0
|
作者
Ngai, ECH [1 ]
Lyu, MR [1 ]
Chin, RT [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Shatin, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme.
引用
收藏
页码:1275 / 1285
页数:11
相关论文
共 50 条
  • [31] Location Service for Mobile Ad Hoc Networks with Holes
    Zhou, Jipeng
    Lu, Zhengjun
    Lu, Jianzhu
    Huang, Shuqiang
    [J]. 2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 91 - 96
  • [32] Voice service support in mobile ad hoc networks
    Jiang, Hai
    Wang, Ping
    Poor, H. Vincent
    Zhuang, Weihua
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 966 - +
  • [33] Quality of Service in mobile ad hoc networks: a survey
    Abbas, Ash Mohammad
    Kure, Oivind
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 6 (02) : 75 - 98
  • [34] Mobile ad hoe services: Semantic service discovery in mobile ad hoc networks
    Nedos, Andronikos
    Singh, Kulpreet
    Clarke, Siobhan
    [J]. SERVICE ORIENTED COMPUTING - ICSOC 2006, PROCEEDINGS, 2006, 4294 : 90 - +
  • [35] Node Level Security Management and Authentication in Mobile Ad Hoc Networks
    Savola, Reijo M.
    [J]. MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 449 - 458
  • [36] An electronic voting protocol with deniable authentication for mobile ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Liu, Chi-Yu
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2534 - 2540
  • [37] Biometric-based user authentication in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    Leung, Victor C. M.
    Liu, Jie
    Lung, Chung-Horng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 5 - 16
  • [38] Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
    Freudiger, Julien
    Raya, Maxim
    Hubaux, Jean-Pierre
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 350 - 372
  • [39] Self-Organized Authentication in Mobile Ad-Hoc Networks
    Caballero-Gil, Pino
    Hernandez-Goya, Candelaria
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (05) : 509 - 517
  • [40] Opportunistic Node Authentication in Intermittently Connected Mobile Ad Hoc Networks
    Ma, Yaozhou
    Jamalipour, Abbas
    [J]. 2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 453 - 457