loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: A. M. Hamad 1 and W. I. Khedr 2

Affiliations: 1 British University in Egypt (BUE), Egypt ; 2 Zagazig University, Egypt

Keyword(s): Mobile ad-hoc networks, Authentication, Man-in-the-middle attack, Key establishment, Transitive authentication.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Mobile System Security ; Network Security ; Peer-To-Peer Security ; Public Key Crypto Applications ; Sensor and Mobile Ad Hoc Network Security ; Wireless Network Security

Abstract: A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in mobile ad hoc networks have limited capabilities and dynamic topology. Authentication of network nodes and the establishment of secret keys among nodes are both target security objectives in ad hoc networks. The constrained devices and other special properties of ad hoc networks make achieving those security properties a challenging task. This paper proposes an authentication protocol, Ad-hoc On Demand Authentication Chain Protocol (AOAC), which allow individual node to authenticate each other and to establish a shared key for secure peer-to-peer communication, the authentication does not rely on any centralize trusted authority or fixed server and is not based on public key cryptography. To provide both node authentication and pair-wise authenticated key establishment we proposed a transitive authentication technique by which active attacks, specially the man-in-the-middle attack, can be prevented. The security of our protocol is analyzed using GNY logic. We also provided simulation and performance analysis of the proposed authentication protocol. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.77.114

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
M. Hamad, A. and I. Khedr, W. (2009). AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 274-284. DOI: 10.5220/0002235102740284

@conference{secrypt09,
author={A. {M. Hamad}. and W. {I. Khedr}.},
title={AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={274-284},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235102740284},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
SN - 978-989-674-005-4
IS - 2184-3236
AU - M. Hamad, A.
AU - I. Khedr, W.
PY - 2009
SP - 274
EP - 284
DO - 10.5220/0002235102740284
PB - SciTePress