Abstract
Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhou, L., Hass, Z.J.: Securing Ad-hoc networks. IEEE Networks 13(6), 24–30 (1999)
Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public Key Management for Mobile Ad-hoc Networks. IEEE Transaction on Mobile Computing 2(1), 52–64 (2003)
Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad hoc Networks. Computer & Security (28), 199–214 (2009)
Dong, Y., Yiu, S.A.-F., Li, S.M., Victor, O.K., Hui, L.C.K.: Providing Distributed Certificate Authority Services in Cluster Based Mobile Ad hoc Networks. Computer Communication (30), 2442–2452 (2007)
Shamir, A.: How to share a secret. Communication of the ACMÂ 22(11), 612 (1979)
Vergadose, D.D., Stergiou, G.: An Authentication Scheme for Ad hoc Networks using Threshold Secret Sharing. Wireless Press Communication (43), 1767–1780 (2007)
Stinson, D.R.: Cryptography, Theory and Practice, 2nd edn., p. 176. Chapman & Hall/CRC, Boca Raton (2002)
Lazos, L., Poovendram, R.: Energy aware secure multicast communication in Ad-hoc networks using Geographical Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing, pp. 201–204 (2003)
Abdulrahman, A.: The PGP trust model. J. Electron Commerce (1997)
Capkun, S., Buttyan, L., Hubaux, J.: Small worlds in security systems: an analysis of the PGP certificate graph. I. In: New Security Paradigms Workshop (2002)
Kohl, J., Neuman, B.: The Kerberos network authentication service version 5. RFC-1510 (1991)
Quisquater, J.J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dey, H., Datta, R. (2011). A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Networks and Communications. CCSIT 2011. Communications in Computer and Information Science, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17878-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-17878-8_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17877-1
Online ISBN: 978-3-642-17878-8
eBook Packages: Computer ScienceComputer Science (R0)