2005
DOI: 10.1007/978-3-540-30582-8_72
|View full text |Cite
|
Sign up to set email alerts
|

A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks

Abstract: Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most fundamental problem that has to be solved before any others. Some previous solutions requiring centralized entities were not scalable and others requiring physical encounter took a long time. We propose a new architecture, called the Secure Overlay Network (SON), for fully distributed authentication. The SON has scalability because … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…When communication begins, say client transmits a message to the intended server, the entire process must be authenticated [11]. After the authentication, they can exchange secret or session keys for communication [10,11,12]. So there is an essence of developing an authentication scheme to avoid failure of any cryptographic goal [13,24,25].…”
Section: Authentication In Wireless (Ad-hoc) Networkmentioning
confidence: 99%
“…When communication begins, say client transmits a message to the intended server, the entire process must be authenticated [11]. After the authentication, they can exchange secret or session keys for communication [10,11,12]. So there is an essence of developing an authentication scheme to avoid failure of any cryptographic goal [13,24,25].…”
Section: Authentication In Wireless (Ad-hoc) Networkmentioning
confidence: 99%
“…Other authentication protocols that have been recently proposed for ad-hoc networks are the following. The work [11] based on the RSA signature conducts to the problem of public key certification. Another recent paper [21] provides a solution that works well, but just for short-lived MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…We believe that authentication is the cornerstone service, since other services depend on the authentication of communication entities [19] [7]. Authentication supports privacy protection by ensuring that entities verify and validate one another before disclosing any secret information.…”
Section: Introductionmentioning
confidence: 99%