AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS

Dorsaf Azzabi, Kunihito Tanaka, Ushio Yamamoto, Yoshikuni Onozato

2008

Abstract

In this paper we investigate the authentication mechanism in mobile ad hoc networks (MANET). Developing a trustworthy authentication mechanism in a dynamic and volatile ad hoc mobile setting is a complex task. The goal of this paper is to propose an authentication mechanism to validate the existence of neighborhood in MANET. We focus on common adjacent nodes which can authenticate and trust a mobile node. Simulation results show the existence of common adjacent nodes that are able to establish trust and obtain the effective range of neighbor authentication in terms of transmission range and node density.

References

  1. Lazos, L., Poovendran, R., 2005. SeRLoc: Robust localization for wireless sensor networks, ACM Transactions on Sensor Networks, vol.1, no.1, pp.73- 100.
  2. Khalil, I., Bagchi, S., Shroff, N.B., 2005. LITEWORP: A lightweight countermeasure for the wormhole attack in multi-hop wireless networks, In the International Conference on Dependable Systems and Networks (DSN), pp.612-621.
  3. Azzabi, D., Uchihara, N., Tanaka, K., Onozato, Y., 2007. Simulation of authentication mechanism in MANET, In The Second Asia-Pacific Symposium on Queueing Theory and Network Applications (QTNA), pp.289- 296.
  4. Bettstetter, C., Hartenstein, H., Perez-costa, X., 2004. Stochastic properties of the random waypoint mobility model, Wireless Networks, vol.10, pp.555-567.
  5. Poturalski, M., Papadimtratos, P., Hubaux, J.P., 2008. Secure neighbor discovery in wireless networks: Formal investigation of possibility, In ASIACCS'08, pp.189-200.
  6. Tanaka, K., Onozato, Y., 2008., Node management method using authentication process with neighbor table in ad hoc network, IPSJ SIG Technical Report, 2008-MBL-44, pp.237-244.
Download


Paper Citation


in Harvard Style

Azzabi D., Tanaka K., Yamamoto U. and Onozato Y. (2008). AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008) ISBN 978-989-8111-62-3, pages 47-52. DOI: 10.5220/0002027300470052


in Bibtex Style

@conference{winsys08,
author={Dorsaf Azzabi and Kunihito Tanaka and Ushio Yamamoto and Yoshikuni Onozato},
title={AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)},
year={2008},
pages={47-52},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002027300470052},
isbn={978-989-8111-62-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)
TI - AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS
SN - 978-989-8111-62-3
AU - Azzabi D.
AU - Tanaka K.
AU - Yamamoto U.
AU - Onozato Y.
PY - 2008
SP - 47
EP - 52
DO - 10.5220/0002027300470052