File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Trust- and clustering-based authentication services in mobile ad hoc networks

TitleTrust- and clustering-based authentication services in mobile ad hoc networks
Authors
Issue Date2004
Citation
Proceedings - International Conference on Distributed Computing Systems, 2004, v. 24, p. 582-587 How to Cite?
AbstractA mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. This work aims at providing a secure and distributed authentication service in ad hoc networks. We propose a secure public key authentication service based on our trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network. We perform an overall evaluation of our proposed approach by simulations. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc networks.
Persistent Identifierhttp://hdl.handle.net/10722/281488

 

DC FieldValueLanguage
dc.contributor.authorNgai, Edith C.H.-
dc.contributor.authorLyu, Michael R.-
dc.date.accessioned2020-03-13T10:38:00Z-
dc.date.available2020-03-13T10:38:00Z-
dc.date.issued2004-
dc.identifier.citationProceedings - International Conference on Distributed Computing Systems, 2004, v. 24, p. 582-587-
dc.identifier.urihttp://hdl.handle.net/10722/281488-
dc.description.abstractA mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributed systems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. This work aims at providing a secure and distributed authentication service in ad hoc networks. We propose a secure public key authentication service based on our trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network. We perform an overall evaluation of our proposed approach by simulations. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc networks.-
dc.languageeng-
dc.relation.ispartofProceedings - International Conference on Distributed Computing Systems-
dc.titleTrust- and clustering-based authentication services in mobile ad hoc networks-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/ICDCSW.2004.1284091-
dc.identifier.scopuseid_2-s2.0-3042598885-
dc.identifier.volume24-
dc.identifier.spage582-
dc.identifier.epage587-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats