An effective trust establishment scheme for authentication in mobile ad-hoc networks

Guojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

17 Citations (Scopus)

Abstract

Distributed authentication has the property of high security compared with existing authentication schemes. However, its success ratio for authentication may be not high, especially in large-scale Mobile Ad-Hoc Networks (MANETs). In order to address this issue, we propose a hybrid authentication scheme which integrates the chained authentication with the distributed authentication. When a node can't find enough authentication nodes in its one-hop neighborhood to authenticate itself, it requests its neighboring nodes to find a certificate chain to do so through the chained authentication. Hence, our scheme overcomes the drawbacks in terms of success ratio for authentication. Theoretical analysis and simulation studies show that, compared with the chained authentication schemes, our scheme is more scalable and it can increase the success ratio for authentication, without sacrificing the security requirement.
Original languageEnglish
Title of host publicationCIT 2007
Subtitle of host publication7th IEEE International Conference on Computer and Information Technology
Pages749-754
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2007
EventCIT 2007: 7th IEEE International Conference on Computer and Information Technology - Aizu-Wakamatsu, Fukushima, Japan
Duration: 16 Oct 200719 Oct 2007

Conference

ConferenceCIT 2007: 7th IEEE International Conference on Computer and Information Technology
Country/TerritoryJapan
CityAizu-Wakamatsu, Fukushima
Period16/10/0719/10/07

Keywords

  • Authentication
  • Cryptography
  • Mobile ad-hoc networks
  • Secret sharing
  • Trust transfer

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software
  • General Mathematics

Fingerprint

Dive into the research topics of 'An effective trust establishment scheme for authentication in mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this