File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/AERO.2004.1367725
- Scopus: eid_2-s2.0-11244256574
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: An authentication service against dishonest users in mobile Ad Hoc networks
Title | An authentication service against dishonest users in mobile Ad Hoc networks |
---|---|
Authors | |
Keywords | Algorithms Computer simulation Distributed computer systems Electronic document identification systems Mathematical models Public key cryptography Security of data Wireless telecommunication systems |
Issue Date | 2004 |
Publisher | IEEE |
Citation | IEEE Aerospace Conference Proceedings, 2004, v. 2, p. 1275-1284 How to Cite? |
Abstract | A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme. |
Persistent Identifier | http://hdl.handle.net/10722/65553 |
ISSN | 2023 SCImago Journal Rankings: 0.383 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ngai, ECH | en_HK |
dc.contributor.author | Lyu, MR | en_HK |
dc.contributor.author | Chin, RT | en_HK |
dc.date.accessioned | 2010-08-31T07:16:01Z | - |
dc.date.available | 2010-08-31T07:16:01Z | - |
dc.date.issued | 2004 | en_HK |
dc.identifier.citation | IEEE Aerospace Conference Proceedings, 2004, v. 2, p. 1275-1284 | en_HK |
dc.identifier.issn | 1095-323X | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/65553 | - |
dc.description.abstract | A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE | en_HK |
dc.relation.ispartof | IEEE Aerospace Conference Proceedings | en_HK |
dc.subject | Algorithms | en_HK |
dc.subject | Computer simulation | en_HK |
dc.subject | Distributed computer systems | en_HK |
dc.subject | Electronic document identification systems | en_HK |
dc.subject | Mathematical models | en_HK |
dc.subject | Public key cryptography | en_HK |
dc.subject | Security of data | en_HK |
dc.subject | Wireless telecommunication systems | en_HK |
dc.title | An authentication service against dishonest users in mobile Ad Hoc networks | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Chin, RT: rchin@hku.hk | en_HK |
dc.identifier.authority | Chin, RT=rp01300 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | en_HK |
dc.identifier.doi | 10.1109/AERO.2004.1367725 | en_HK |
dc.identifier.scopus | eid_2-s2.0-11244256574 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-11244256574&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 2 | en_HK |
dc.identifier.spage | 1275 | en_HK |
dc.identifier.epage | 1284 | en_HK |
dc.publisher.place | United States | en_HK |
dc.identifier.scopusauthorid | Ngai, ECH=7003298971 | en_HK |
dc.identifier.scopusauthorid | Lyu, MR=7006811415 | en_HK |
dc.identifier.scopusauthorid | Chin, RT=7102445426 | en_HK |
dc.identifier.issnl | 1095-323X | - |