Trust- and clustering-based authentication services in mobile ad hoc networks

A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems,...

Full description

Saved in:
Bibliographic Details
Published in24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops) pp. 582 - 587
Main Authors Ngai, E.C.H., Lyu, M.R.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2004
Subjects
Online AccessGet full text
ISBN9780769520872
0769520871
DOI10.1109/ICDCSW.2004.1284091

Cover

More Information
Summary:A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. We aim at providing a secure and distributed authentication service in ad hoc networks. We propose a secure public key authentication service based on our trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network. We perform an overall evaluation of our proposed approach by simulations. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc networks.
ISBN:9780769520872
0769520871
DOI:10.1109/ICDCSW.2004.1284091