Skip to main content

A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network

  • Conference paper
Advances in Networks and Communications (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 132))

Abstract

Mobile ad hoc network (MANET) requires high security to exchange information for its usage in environments like military deployment, disaster management and rescue operations. But due to the vulnerabilities of wireless domain, and the lack of any infrastructure in most of the deployment cases, establishing a secure MANET system is a non trivial matter. Many secure routing and cryptographic protocols that are related to packet forwarding, key management and authentication among nodes have been suggested in the literature. As MANET nodes are mobile and have constrained resources, the proposed cryptographic techniques in most cases are not suitable for practical purposes due to high communication and computation overhead. Our work aims to establish a distributed certification authority that is based on threshold secret sharing trust establishment keeping in mind the above constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Hass, Z.J.: Securing Ad-hoc networks. IEEE Networks 13(6), 24–30 (1999)

    Article  Google Scholar 

  2. Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public Key Management for Mobile Ad-hoc Networks. IEEE Transaction on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  3. Omar, M., Challal, Y., Bouabdallah, A.: Reliable and Fully Distributed Trust Model for Mobile Ad hoc Networks. Computer & Security (28), 199–214 (2009)

    Google Scholar 

  4. Dong, Y., Yiu, S.A.-F., Li, S.M., Victor, O.K., Hui, L.C.K.: Providing Distributed Certificate Authority Services in Cluster Based Mobile Ad hoc Networks. Computer Communication (30), 2442–2452 (2007)

    Google Scholar 

  5. Shamir, A.: How to share a secret. Communication of the ACM 22(11), 612 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  6. Vergadose, D.D., Stergiou, G.: An Authentication Scheme for Ad hoc Networks using Threshold Secret Sharing. Wireless Press Communication (43), 1767–1780 (2007)

    Google Scholar 

  7. Stinson, D.R.: Cryptography, Theory and Practice, 2nd edn., p. 176. Chapman & Hall/CRC, Boca Raton (2002)

    MATH  Google Scholar 

  8. Lazos, L., Poovendram, R.: Energy aware secure multicast communication in Ad-hoc networks using Geographical Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing, pp. 201–204 (2003)

    Google Scholar 

  9. Abdulrahman, A.: The PGP trust model. J. Electron Commerce (1997)

    Google Scholar 

  10. Capkun, S., Buttyan, L., Hubaux, J.: Small worlds in security systems: an analysis of the PGP certificate graph. I. In: New Security Paradigms Workshop (2002)

    Google Scholar 

  11. Kohl, J., Neuman, B.: The Kerberos network authentication service version 5. RFC-1510 (1991)

    Google Scholar 

  12. Quisquater, J.J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dey, H., Datta, R. (2011). A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Networks and Communications. CCSIT 2011. Communications in Computer and Information Science, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17878-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17878-8_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17877-1

  • Online ISBN: 978-3-642-17878-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics