Digital Library

cab1

 
Title:      IDENTITY-BASED SECURITY SCHEME WITH THRESHOLD SECRET SHARING FOR AD HOC NETWORK
Author(s):      Shubat S. Ahmeda , Jamal S. Benrabha
ISBN:      978-972-8924-62-1
Editors:      Jörg Roth and Jairo Gutiérrez
Year:      2008
Edition:      Single
Keywords:      Ad hoc network, Authentication, Information security
Type:      Full Paper
First Page:      10
Last Page:      16
Language:      English
Cover:      cover          
Full Contents:      click to dowload Download
Paper Abstract:      Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The fact that there is no central infrastructure and that the devices can move randomly gives rise to various kinds of problems, such as routing and security. Attacks on routing protocols can create various undesirable effects that defeat the objectives of ad-hoc routing, Ad hoc networks are much more vulnerable to malicious exploits than a wired network. Secure communication is an important aspect of any network environment. Therefore to provide secure ad hoc network: authentication, confidentiality, integrity, non-repudiation and access control should be provided. Authentication comes in the first place to ensure secure network operation, since other services depend on the authentication of communication entities. In mobile ad hoc, there is possibility of nodes being compromised, therefore, the network should not have any central control but instead have distributed architecture; when avoiding central control it’s more difficult to implement authentication protocol. In this paper, the recently developed identity based scheme with threshold secret sharing will be used in two different scenarios; in the first scenario the serving nodes have been assumed as fixed nodes, in the second scenario the serving nodes have been assumed as mobile nodes. The purpose of applying this scheme is to provide authentication, confidentiality, reduce computation cost and avoid central control. The proposed algorithm has been built and tested using computer simulator method. The simulator that has been used to simulate the ad hoc authentication protocol is a self-developed simulator.
   

Social Media Links

Search

Login