Abstract
Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most fundamental problem that has to be solved before any others. Some previous solutions requiring centralized entities were not scalable and others requiring physical encounter took a long time. We propose a new architecture, called the Secure Overlay Network (SON), for fully distributed authentication. The SON has scalability because it is constructed in a self-organizing manner. The SON also has NPC-reachability which makes the SON robust against Sybil attacks, and guarantees authentication service between any two nodes in the SON. Both NPC-reachability and simulation results confirm the effectiveness of our architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhou, L., Hass, Z.J.: Securing Ad Hoc Networks. IEEE Network 12(6), 24–30 (1999)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE ICNP (2001)
Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad Hoc Networks. In: ACM MobiHoc (2003)
Douceur, J.: The Sybil attack. In: IPTPS (2002)
Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice-Hall, Englewood Cliffs
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1999)
Narasimha, M., Tsudik, G., Yi, J.H.: On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control. In: IEEE ICNP (2003)
Hubaux, J., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: ACM MobiHoc 2001 (2001)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: ISCC 2002 (2002)
Desmedt, Y.: Threshold cryptography. European Transactions on Telecommunications 5(4), 449–457 (1994)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 354–371. Springer, Heidelberg (1996)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: ACM MobiCom (2000)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Lou, W., Wu, J.: Double-Covered Broadcast (DCB): A Simple Reliable Broadcast Algorithm in MANETs. In: IEEE INFOCOM 2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hahm, S., Jung, Y., Yi, S., Song, Y., Chong, I., Lim, K. (2005). A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks. In: Kim, C. (eds) Information Networking. Convergence in Broadband and Mobile Networking. ICOIN 2005. Lecture Notes in Computer Science, vol 3391. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30582-8_72
Download citation
DOI: https://doi.org/10.1007/978-3-540-30582-8_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24467-7
Online ISBN: 978-3-540-30582-8
eBook Packages: Computer ScienceComputer Science (R0)