Randomly Shifted Certification Authority Authentication Protocol for MANETs

@inproceedings{Safdar2007RandomlySC,
  title={Randomly Shifted Certification Authority Authentication Protocol for MANETs},
  author={Ghazanfar Ali Safdar and M{\'a}ire McLoone},
  year={2007}
}
Security in mobile ad hoc networks is difficult to achieve because of vulnerability of the links, inadequate physical protection, the dynamically changing topology and the sporadic nature of the connectivity. The dynamic change in topology results in the change of trust relationships among the nodes and as a result any security solution with a static configuration will not suffice. Authentication protocols and key management play a vital role and are the basis of security in many distributed… 
Performance Analysis of Novel Randomly Shifted Certification Authority Authentication Protocol for MANETs
TLDR
RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-relatedeffects of the cryptographic algorithms employed.
MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET
TLDR
A novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics and Enhanced Hash Message Authentication Code (EHMAC) can be used.
Certificate Exchange and Revocation Mechanism for the Multiple Certification Authority in MANET
TLDR
The proposed schemes provide some measure of protection against malicious accusation succeeding in causing the revocation of certificates of trustworthy, well-behaving nodes.
An efficient k-Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks
TLDR
A certificate revocation status validation scheme using the concept of clustering from data mining that can meet the aforementioned requirements and boost the efficiency of certificate validation, thereby enhancing the security of a vehicular ad hoc network is proposed.
A secure MAC protocol for Cognitive Radio Networks (SMCRN)
TLDR
It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequent secure communication.
Towards Efficient Certificate Revocation Status Validation in Vehicular Ad Hoc Networks with Data Mining
TLDR
The analytical results demonstrate that this scheme can effectively improve the validation of certificates and thus secure the vehicular communication in vehicular networks.
Weighted Clustering Trust Model for Mobile Ad Hoc Networks
TLDR
This work investigated MANETs trust based clustering algorithm and found the packet delivery ratio improved by 16.18 % than 10 % malicious nodes with trust in the network compared with Trust model weighted clustering without malicious nodes for 40 nodes.
Architecting Adaptable Security Infrastructures for Pervasive Networks through Components
TLDR
The benefits of a component-based security architecture are illustrated by presenting AMISEC, an integrated authentication and authorization middleware that supports different network topologies of TTPs, cryptographic algorithms, protocols, or trust management strategies, resulting in a fully a la carte security infrastructure.
Minimum energy wireless sensor networks
TLDR
This paper presents a meta-modelling architecture suitable for embedding wireless sensors within physical entities that relay data to a central control point and shows how these networks may also be required to interact with each other.
...
1
2
...

References

SHOWING 1-10 OF 11 REFERENCES
A cluster-based security architecture for ad hoc networks
TLDR
This work proposes and evaluates a security concept based on a distributed certification facility that divides a network into clusters and allows new nodes to participate in the network as guests but can only become full members with a network-signed certificate after their authenticity has been warranted by some other members.
Localized public-key management for mobile ad hoc networks
TLDR
This paper proposes an on-demand, fully localized, and hop-by-hop public key management scheme for MANETs that can be performed by generating public/private key pairs by nodes themselves, issuing certificates to neighboring nodes, holding these certificates in their certificate repositories, and providing an authentication service quickly adaptive to the dynamic topology of the network without relying on any servers.
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
TLDR
This paper presents LHAP a scalable and light-weight authentication protocol for ad hoc networks based on hop-by-hop authentication for verifying the authenticity of all the packets transmitted in the network and one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes.
Self-securing ad hoc wireless networks
TLDR
This work provides scalable, distributed authentication services in ad hoc networks, in which multiple nodes collaboratively provide authentication services for other nodes in the network, and formalizes a localized trust model that lays the foundation for the design.
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Privacy and authentication for wireless local area networks
TLDR
The authors present the design of a secure communication protocol that provides for both the privacy of wireless data communications and the authenticity of communicating parties and present proof of the security of the protocol using the logic of authentication formalism developed by Burrows, Abadi, and Needham (1990).
An enhanced authentication protocol for personal communication systems
  • J. Stach, E. Park, Z. Su
  • Computer Science
    Proceedings. 1998 IEEE Workshop on Application-Specific Software Engineering and Technology. ASSET-98 (Cat. No.98EX183)
  • 1998
TLDR
This work extends the core authentication functions of GSM to include a one way function that establishes trust between the mobile unit and visiting location register and presents a simple authentication protocol for personal communication systems emphasizing non-repudiation and play back attack prevention.
Securing ad hoc networks
TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures
  • Qingchun Ren, Q. Liang
  • Computer Science
    2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754)
  • 2004
TLDR
A secure MAC protocol improve the security of WSN, which is based on the RTS(request to send)/CTS(clear to send) mechanism is proposed.
Identity-Based Encryption from the Weil Pairing
TLDR
This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
...
1
2
...