Authentication Scheme for Mobile Ad Hoc Networks

نویسندگان

  • Attila Török
  • Csaba Simon
چکیده

-The technological progress of recent years made available devices for a large audience, which is powerful enough to randomly form Mobile Ad Hoc Networks (MAHNWs). However the spread of MAHNWs is still obstructed by unsettled technical issues. Besides the topics related to the functionality of a MAHNW (e.g. location of mobile stations, routing protocols) the proliferation of the MAHNWs is conditioned by the existence of security services. The primary target user group is the business community, since it has both the motivation and financial strength to use MAHNWs. In this environment authentication and availability is especially sensitive question. This paper proposes an authentication scheme for MAHNWs. It provides a basic authentication service even for the nodes, which cannot present a valid certification. The basic idea is to exploit the broadcasting capability of the radio signals. In such an environment the messages sent by a potential attacker is always available for its neighbors, each sender can monitor the next hop, whether it forwards the correct data or cheats. Thus we can eliminate the man-in-themiddle and denial-of-service attacks and limit the possibility of false authentication to some special cases. With the intention to further improve the mechanism the MAHNW is partitioned in domains. This technique also avoids broadcast storms and improves performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Threshold password authentication against guessing attacks in Ad hoc networks

Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as availability and stro...

متن کامل

Alternative Authentication scheme for Mobile Ad Hoc Networks

Mobile Ad Hoc Network (MANET) is a wireless networking technology with high mobility and continuous changing of nodes number. The prevention mechanisms of authentication are the first line of defense against the malicious attacks. However, using the traditional authentication schemes is not suitable for the limited resources environments. This research is going to develop a new lightweight auth...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005