Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks

被引:0
|
作者
Parisa Memarmoshrefi
Roman Seibel
Dieter Hogrefe
机构
[1] University of Göttingen,Institute of Computer Science, Telematics Group
来源
关键词
Public key authentication; Security threat in trust and reputation systems; Ant colony optimization; MANETs;
D O I
暂无
中图分类号
学科分类号
摘要
In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide authentication, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are not viable for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized and localized public key authentication mechanism based on ant colony systems. Every node generates its own public-private key pair, issues certificates to neighboring nodes and provides on-demand authentication services by means of gathering certificate chains towards a target node. Pheromone concentration left by ants along the path of the certificate chains represents the trust level of a node towards other nodes. This model is able to authenticate public keys by selecting the most trustworthy certificate chains gathered by ants and can identify and exclude certificate chains with malicious nodes.
引用
收藏
页码:149 / 160
页数:11
相关论文
共 50 条
  • [21] Using ant-based agents for congestion control in ad-hoc wireless sensor networks
    Sanjay K. Dhurandher
    Sudip Misra
    Harsh Mittal
    Anubhav Agarwal
    Isaac Woungang
    [J]. Cluster Computing, 2011, 14 : 41 - 53
  • [22] Using ant-based agents for congestion control in ad-hoc wireless sensor networks
    Dhurandher, Sanjay K.
    Misra, Sudip
    Mittal, Harsh
    Agarwal, Anubhav
    Woungang, Isaac
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2011, 14 (01): : 41 - 53
  • [23] Ant-based energy conservation for ad hoc networks
    Srisathapornphat, C
    Shen, CC
    [J]. ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 32 - 37
  • [24] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [25] Design of an ANT based Routing algorithm for Mobile Ad-Hoc Networks
    Jayalalitha, B.
    Reddy, P. Chenna
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 74 - 76
  • [26] A public key algorithm for ad-hoc networks
    Carbunar, B
    Grama, A
    Vitek, J
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 319 - 320
  • [27] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing
    Hao, Liming
    Li, Xiehua
    Yang, Shutang
    Lu, Songnian
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
  • [28] Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks
    Zhou, Hongbo
    Mutak, Matt W.
    Ni, Lionel M.
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 427 - 434
  • [29] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [30] Mobile ad-hoc network - A novel node authentication mechanism
    Mahmood, Syed Azhar
    Ahmed, Farhan
    Qureshi, Zaffar I.
    Jafri, M. N.
    [J]. PROCEEDINGS OF THE WSEAS INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING: SELECTED TOPICS ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING, 2007, : 609 - +