Trust- and clustering-based authentication services in mobile ad hoc networks
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems,...
Saved in:
Published in | 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops) pp. 582 - 587 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2004
|
Subjects | |
Online Access | Get full text |
ISBN | 9780769520872 0769520871 |
DOI | 10.1109/ICDCSW.2004.1284091 |
Cover
Summary: | A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. We aim at providing a secure and distributed authentication service in ad hoc networks. We propose a secure public key authentication service based on our trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network. We perform an overall evaluation of our proposed approach by simulations. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc networks. |
---|---|
ISBN: | 9780769520872 0769520871 |
DOI: | 10.1109/ICDCSW.2004.1284091 |