Sondes Larafa

Learn More
Ad-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. Our work focuses on a light and distributed AAA infrastructure that supports authentication and authorization. We make use of a distributed protocol based on the threshold cryptography(More)
Ad-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. In a previous work, we focused on a light and distributed AAA framework using a six message-AAA protocol, and an access token mechanism. In this article, we optimize this AAA protocol(More)
Access control AAA infrastructures are traditionally used by the service providers so as to charge their subscribers. Given the easiness and the cheapness of MANET deployment and provided that charging is possible, service providers are likely to offer their services over MANET. In previous works [1] and [2], we presented a distributed AAA framework for(More)
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security associations. If the Mobile Node is authenticated for network access, the current IETF approach is to use DHCPv6 to deliver the Home Agent and then to use IKEv2. In this article, we(More)
In previous work, we designed a distributed AAA framework for MANETs for which we defined a simple and robust AAA authentication and authorization protocol whose specification carries some implementation latitude. The protocol, therefore, offers several options. In this paper, we propose some of the possible implementation options for which we conducted an(More)
  • 1