Title:
|
IDENTITY-BASED SECURITY SCHEME WITH THRESHOLD SECRET SHARING FOR AD HOC NETWORK |
Author(s):
|
Shubat S. Ahmeda , Jamal S. Benrabha |
ISBN:
|
978-972-8924-62-1 |
Editors:
|
Jörg Roth and Jairo Gutiérrez |
Year:
|
2008 |
Edition:
|
Single |
Keywords:
|
Ad hoc network, Authentication, Information security |
Type:
|
Full Paper |
First Page:
|
10 |
Last Page:
|
16 |
Language:
|
English |
Cover:
|
|
Full Contents:
|
click to dowload
|
Paper Abstract:
|
Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The fact
that there is no central infrastructure and that the devices can move randomly gives rise to various kinds of problems,
such as routing and security. Attacks on routing protocols can create various undesirable effects that defeat the objectives
of ad-hoc routing, Ad hoc networks are much more vulnerable to malicious exploits than a wired network. Secure
communication is an important aspect of any network environment. Therefore to provide secure ad hoc network:
authentication, confidentiality, integrity, non-repudiation and access control should be provided. Authentication comes in
the first place to ensure secure network operation, since other services depend on the authentication of communication
entities. In mobile ad hoc, there is possibility of nodes being compromised, therefore, the network should not have any
central control but instead have distributed architecture; when avoiding central control its more difficult to implement
authentication protocol. In this paper, the recently developed identity based scheme with threshold secret sharing will be
used in two different scenarios; in the first scenario the serving nodes have been assumed as fixed nodes, in the second
scenario the serving nodes have been assumed as mobile nodes. The purpose of applying this scheme is to provide
authentication, confidentiality, reduce computation cost and avoid central control. The proposed algorithm has been built
and tested using computer simulator method. The simulator that has been used to simulate the ad hoc authentication
protocol is a self-developed simulator. |
|
|
|
|