Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks

被引:3
|
作者
Memarmoshrefi, Parisa [1 ]
Seibel, Roman [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Gottingen, Telemat Grp, Inst Comp Sci, Goldschmidtstr 7, D-37077 Gottingen, Germany
来源
MOBILE NETWORKS & APPLICATIONS | 2016年 / 21卷 / 01期
关键词
Public key authentication; Security threat in trust and reputation systems; Ant colony optimization; MANETs;
D O I
10.1007/s11036-016-0703-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide authentication, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are not viable for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized and localized public key authentication mechanism based on ant colony systems. Every node generates its own public-private key pair, issues certificates to neighboring nodes and provides on-demand authentication services by means of gathering certificate chains towards a target node. Pheromone concentration left by ants along the path of the certificate chains represents the trust level of a node towards other nodes. This model is able to authenticate public keys by selecting the most trustworthy certificate chains gathered by ants and can identify and exclude certificate chains with malicious nodes.
引用
收藏
页码:149 / 160
页数:12
相关论文
共 50 条
  • [41] A Stable Ant-based Routing Protocol for Flying Ad Hoc Networks
    Zheng, Xueli
    Qi, Qian
    Wang, Qingwen
    Li, Yongqiang
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 410 - 416
  • [42] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    [J]. ELECTRONICS, 2021, 10 (04)
  • [43] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    [J]. 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [44] Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks
    Correia, Fernando
    Vazao, Teresa
    Lobo, Victor J.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON EMERGING NETWORK INTELLIGENCE (EMERGING 2009), 2009, : 85 - +
  • [45] A self-organized authentication architecture in mobile ad-hoc networks
    Hahm, S
    Jung, Y
    Yi, S
    Song, Y
    Chong, E
    Lim, K
    [J]. INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 689 - 696
  • [46] An architecture for key management in hierarchical mobile ad-hoc networks
    Rhee, KH
    Park, YH
    Tsudik, G
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (02) : 156 - 162
  • [47] Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    Molina-Gil, J.
    Hernandez-Goya, C.
    [J]. 2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 208 - +
  • [48] Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks
    Asaeda, Hitoshi
    Rahman, Musfiq
    Manshaei, Mohammad Hossein
    Fukuzawa, Yasuko
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 2205 - 2210
  • [49] A two-step authentication framework in mobile ad-hoc networks
    Komninos, Nikos
    Vergados, Dimitris
    Douligeris, Christos
    [J]. CHINA COMMUNICATIONS, 2007, 4 (01) : 28 - 39
  • [50] An effective trust establishment scheme for authentication in Mobile Ad-Hoc Networks
    Wang, Guojun
    Wang, Qiong
    Ca, Jiannong
    Guo, Minyi
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 749 - +