File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: An authentication service against dishonest users in mobile Ad Hoc networks

TitleAn authentication service against dishonest users in mobile Ad Hoc networks
Authors
KeywordsAlgorithms
Computer simulation
Distributed computer systems
Electronic document identification systems
Mathematical models
Public key cryptography
Security of data
Wireless telecommunication systems
Issue Date2004
PublisherIEEE
Citation
IEEE Aerospace Conference Proceedings, 2004, v. 2, p. 1275-1284 How to Cite?
AbstractA mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme.
Persistent Identifierhttp://hdl.handle.net/10722/65553
ISSN
2023 SCImago Journal Rankings: 0.383
References

 

DC FieldValueLanguage
dc.contributor.authorNgai, ECHen_HK
dc.contributor.authorLyu, MRen_HK
dc.contributor.authorChin, RTen_HK
dc.date.accessioned2010-08-31T07:16:01Z-
dc.date.available2010-08-31T07:16:01Z-
dc.date.issued2004en_HK
dc.identifier.citationIEEE Aerospace Conference Proceedings, 2004, v. 2, p. 1275-1284en_HK
dc.identifier.issn1095-323Xen_HK
dc.identifier.urihttp://hdl.handle.net/10722/65553-
dc.description.abstractA mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. It is an emerging technology for civilian and military applications. However, security in mobile ad hoc networks is hard to achieve due to the vulnerability of the links, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. Similar to other distributed systems, security in mobile ad hoc networks usually relies on the use of different key management mechanisms. In this paper, we exploit characteristics of an ad hoc network and present our authentication service to protect network security in the presence of dishonest users. Nodes originally trustable in the network may become malicious due to sudden attacks, so an adequate security support for authentication to deal with dishonest users who issue false public key certificates is crucial. We describe a new authentication service with a well-defined network model and a trust model. These models allow nodes in the network to monitor and rate each other with an authentication metric. We also propose a novel public key certificate operation, incorporating with a trust value update algorithm in public key authentication. The authentication service we propose is able to discover and isolate dishonest users in the network. Finally, we evaluate the proposed solution through simulation to demonstrate the effectiveness of the scheme.en_HK
dc.languageengen_HK
dc.publisherIEEEen_HK
dc.relation.ispartofIEEE Aerospace Conference Proceedingsen_HK
dc.subjectAlgorithmsen_HK
dc.subjectComputer simulationen_HK
dc.subjectDistributed computer systemsen_HK
dc.subjectElectronic document identification systemsen_HK
dc.subjectMathematical modelsen_HK
dc.subjectPublic key cryptographyen_HK
dc.subjectSecurity of dataen_HK
dc.subjectWireless telecommunication systemsen_HK
dc.titleAn authentication service against dishonest users in mobile Ad Hoc networksen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailChin, RT: rchin@hku.hken_HK
dc.identifier.authorityChin, RT=rp01300en_HK
dc.description.naturelink_to_subscribed_fulltexten_HK
dc.identifier.doi10.1109/AERO.2004.1367725en_HK
dc.identifier.scopuseid_2-s2.0-11244256574en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-11244256574&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume2en_HK
dc.identifier.spage1275en_HK
dc.identifier.epage1284en_HK
dc.publisher.placeUnited Statesen_HK
dc.identifier.scopusauthoridNgai, ECH=7003298971en_HK
dc.identifier.scopusauthoridLyu, MR=7006811415en_HK
dc.identifier.scopusauthoridChin, RT=7102445426en_HK
dc.identifier.issnl1095-323X-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats