An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation

被引:0
|
作者
Ngai, Edith C. H. [1 ]
Lyu, Michael R. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
来源
IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Consequently, novel approaches are necessary to address the security problem without sacrificing the essential properties of the wireless ad hoc network. Similar to other distributed systems, security in wireless ad hoc networks usually relies on the use of key management mechanisms. In this paper, we present a distributed public key authentication service to protect the network containing malicious and colluding nodes. Our solution was built on a clustering based network model and a trust model. These models allow mobile hosts to monitor and rate each other with an authentication metric. We also propose a new system of public key certification in conjunction with a trust value update algorithm. Our authentication service is able to discover and isolate malicious and colluding nodes, in the network. Finally, we perform security evaluation on the proposed solution. We simulate a network containing malicious nodes and measure a number of metrics with various security operations to demonstrate the effectiveness of our scheme.
引用
收藏
页码:94 / +
页数:2
相关论文
共 50 条
  • [1] Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 345 - +
  • [2] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [3] Trust- and clustering-based authentication services in mobile ad hoc networks
    Ngai, ECH
    Lyu, MR
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 582 - 587
  • [4] Authentication based on multilayer clustering in ad hoc networks
    Lee K.-H.
    Han S.-B.
    Suh H.-S.
    Lee S.
    Hwang C.-S.
    EURASIP Journal on Wireless Communications and Networking, 2005 (5) : 731 - 742
  • [5] A trust enhanced secure clustering framework for wireless ad hoc networks
    Pushpita Chatterjee
    Uttam Ghosh
    Indranil Sengupta
    Soumya K. Ghosh
    Wireless Networks, 2014, 20 : 1669 - 1684
  • [6] A trust enhanced secure clustering framework for wireless ad hoc networks
    Chatterjee, Pushpita
    Ghosh, Uttam
    Sengupta, Indranil
    Ghosh, Soumya K.
    WIRELESS NETWORKS, 2014, 20 (07) : 1669 - 1684
  • [7] A Trust Based Clustering Framework for Securing Ad Hoc Networks
    Chatterjee, Pushpita
    Sengupta, Indranil
    Ghosh, S. K.
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 : 313 - 324
  • [8] Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks
    Ren, Yonglin
    Boukerche, Azzedine
    Pazzi, Richard Werner Nelem
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [9] Cluster based trust evaluation in ad hoc networks
    Park, C
    Lee, Y
    Yoon, H
    Jin, S
    Choi, D
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 503 - 507
  • [10] Security and trust in Mobile Ad Hoc Networks
    Guizani, Mohsen
    CNSR 2006: Communication Networks and Services Research Conference, Proceedings, 2006, : 4 - 5