UGSP: Authentication Based Secure Protocol for Ad-Hoc Networks
نویسندگان
چکیده
A wireless ad-hoc network is a collection of mobile nodes with no fixed infrastructure. Security in such networks poses serious challenges due to (i) the network connectivity could be intermittent and hence on-line authentication is not guaranteed, and (ii) susceptible to wide range of attacks due to broadcast communication and large scale number of users. In this paper, we propose a security protocol, called UGSP, for wireless ad-hoc networks using a tamper-proof hardware. We show that the proposed protocol fits well with the resurrecting duckling security paradigm (Stajano and Anderson, 1999). Once the hardware is imprinted for authentication, UGSP is robust to man-in-the-middle attack, passive eavesdropping, active impersonation attacks ensuring source authentication, data confidentiality and data integrity for communication amongst nodes with identically configured hardware. The system is amenable to dynamic addition of new members whose hardware has also been imprinted with authentication information. We provide a comparative evaluation of UGSP with other approaches and show that UGSP is scalable and cost-effective.
منابع مشابه
Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks
Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH an...
متن کاملAuthentication Based on Multilayer Clustering in Ad Hoc Networks
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called “authentication based on multilayer clustering for ad hoc n...
متن کاملA Platform for Implementing Secure Wireless Ad Hoc Networks
We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the Ethernet layer. Within our platform we use a new security protocol that we designed to ensure mutual authentication between nodes and a secure key exchange. The correctness of the proposed security protocol is ensured by...
متن کاملA Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004