A global authentication scheme for Mobile Ad-hoc networks

被引:0
|
作者
Caballero-Gil, P. [1 ]
Caballero-Gil, C. [2 ]
机构
[1] Univ La Laguna, Dept Stat Operat Res & Comp, Tenerife 38271, Spain
[2] Univ Las Palmas Gran Canaria, Dept Informat & Syst, Gran Canaria 35017, Spain
关键词
authentication; access control; MANETs;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work proposes a new global authentication system for Mobile Ad-hoc Networks. The component algorithms are designed in a self-organizing way so that most needs of this sort of networks are covered. In particular, characteristics such as adaptation to the varying topology of the network, open availability of broadcast transmissions, and strong access control have received special attention when defining the new scheme. The described protocol is based on the cryptographic paradigm of Zero-Knowledge Proofs. In this paper the design is thought for the Hamiltonian Cycle Problem, but it might be easily adapted to other NP-complete graph problems.
引用
收藏
页码:105 / +
页数:3
相关论文
共 50 条
  • [31] A two-step authentication framework in mobile ad-hoc networks
    Komninos, Nikos
    Vergados, Dimitris
    Douligeris, Christos
    CHINA COMMUNICATIONS, 2007, 4 (01) : 28 - 39
  • [32] Predictive Scheme for Location Service in Mobile Ad-Hoc Networks
    Amar, Ebtisam
    Boumerdassi, Selma
    Renault, Eric
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 522 - +
  • [33] A Two-Step Authentication Framework in Mobile Ad-Hoc Networks
    Nikos Komninos
    Dimitris Vergados
    Christos Douligeris
    中国通信, 2007, 4 (01) : 28 - 39
  • [34] Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
    Lee, Hyewon K.
    Choi, Jaeyoung
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 653 - 661
  • [35] Virtual Mobile Ad-hoc Networks
    Lahav, Jonathan
    Stulman, Ariel
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
  • [36] Security scheme for ad-hoc networks
    Kalligeros, H
    Hadjiefthymiades, S
    Frantzeskakis, D
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 52 - 61
  • [37] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [38] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [39] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [40] Actors for mobile ad-hoc networks
    Dedecker, J
    Van Belle, W
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 482 - 494