Advertisement

A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks

  • P. Caballero-Gil
  • C. Caballero-Gil
  • J. Molina-Gil
  • A. Quesada-Arencibia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4739)

Abstract

This work provides both a new global authentication system for Mobile Ad-hoc NETworks and a study of its simulation with NS-2. The proposed scheme is constructed in a self-organizing manner, which implies the fulfillment of most requirements for this type of networks, such as adaptation to the changing topology of the network, public availability of broadcast communications and strength of access control.

Keywords

Authentication Access Control MANETs Simulation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aboudagga, N., Tamer, M., Eltoweissy, M., DaSilva, L., Quisquater, J.J.: Authentication protocols for ad hoc networks: Taxonomy and research issues. In: Proceedings of ACM Q2SWinet, ACM Press, New York (2005)Google Scholar
  2. 2.
    Asaeda, H., Rahman, M., Manshaei, H., Fukuzawa, Y.: Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks. In: Proceedings of IEEE WCNC, Implementation of Group Member Authentication (2006)Google Scholar
  3. 3.
    Caballero-Gil, P., Hernández-Goya, C.: Strong solutions to the identification problem. In: Wang, J. (ed.) COCOON 2001. LNCS, vol. 2108, pp. 257–261. Springer, Heidelberg (2001)Google Scholar
  4. 4.
    Hahm, S., Jung, Y., Yi, S., Song, Y., Chong, I., Lim, K.: A Self-Organized Authentication Architecture in Mobile Ad-Hoc Networks. In: Meersman, R., Tari, Z. (eds.) On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE. LNCS, vol. 3291, pp. 689–696. Springer, Heidelberg (2004)Google Scholar
  5. 5.
    Saxena, N., Tsudik, G., Yi, J.H.: Efficient node admission for short-lived mobile ad hoc networks. In: Proceedings of IEEE ICNP, pp. 269–278. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  6. 6.
    Weimerskirch, A.: Authentication in Ad-hoc and Sensor Networks. Ph.D. Thesis Ruhr-University Bochum. Germany (July 2004)Google Scholar
  7. 7.
    Wierzbicki, A., Zwierko, A., Kotulski, Z.: A New Authentication Protocol for Revocable Anonymity in Ad-Hoc Networks. In: Proceedings of IASTED CNIS (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • P. Caballero-Gil
    • 1
  • C. Caballero-Gil
    • 1
  • J. Molina-Gil
    • 1
  • A. Quesada-Arencibia
    • 2
  1. 1.Department of Statistics, Operations Research and Computing. University of La Laguna. 38271 La Laguna. Tenerife.Spain
  2. 2.Department of Informatics and Systems. University of Las Palmas de Gran Canaria. 35017 Las Palmas de Gran Canaria. Gran Canaria.Spain

Personalised recommendations