Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)
DOI: 10.1109/wiopt.2005.42
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Impersonation Attacks in MANET with Multi-Factor Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…In preventing impersonation attacks in MANETs with multi-factor authentication, Glynos et al [26] proposed a framework via a cryptographic association to secure the physical device with the logical address. The framework achieved this target by using the certification of keys and nodes with the use of additional hardware and firmware installed on each node of the ad hoc network.…”
Section: Trusted Third Party or Certification Authoritymentioning
confidence: 99%
See 1 more Smart Citation
“…In preventing impersonation attacks in MANETs with multi-factor authentication, Glynos et al [26] proposed a framework via a cryptographic association to secure the physical device with the logical address. The framework achieved this target by using the certification of keys and nodes with the use of additional hardware and firmware installed on each node of the ad hoc network.…”
Section: Trusted Third Party or Certification Authoritymentioning
confidence: 99%
“…Hence, these issues make these approaches unsuitable for infrastructure-less environments, such as 802. 11-based ad hoc networks, due to the resource constraint devices and distributed nature of the network [22,25,26].…”
Section: Software-based Approachesmentioning
confidence: 99%
“…Certified keys and certified node characteristics are the two separate authentication aspects that enable to accomplish this. During vital applications, the proposed framework provides the supplementary confidence level essential for node verification even though additional sensing capabilities from theMANET nodes are essential [21].…”
Section: Related Workmentioning
confidence: 99%
“…Impersonation [14] is the ability to present credentials as if you are something or someone you are not. These attacks can take several forms: by capturing the data packets or recording an authorization sequence to replay at a later time.…”
Section: Unauthorized Access By Impersonation Attackmentioning
confidence: 99%