loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Dorsaf Azzabi ; Kunihito Tanaka ; Ushio Yamamoto and Yoshikuni Onozato

Affiliation: Graduate School of Engineering, Gunma University, Japan

ISBN: 978-989-8111-62-3

Keyword(s): MANET, transmission range, mobility, neighbor authentication.

Related Ontology Subjects/Areas/Topics: Mobile Ad-Hoc and Sensor Networks ; Sensor, Mesh and Ad Hoc Communications and Networks ; Telecommunications ; Wireless Information Networks and Systems

Abstract: In this paper we investigate the authentication mechanism in mobile ad hoc networks (MANET). Developing a trustworthy authentication mechanism in a dynamic and volatile ad hoc mobile setting is a complex task. The goal of this paper is to propose an authentication mechanism to validate the existence of neighborhood in MANET. We focus on common adjacent nodes which can authenticate and trust a mobile node. Simulation results show the existence of common adjacent nodes that are able to establish trust and obtain the effective range of neighbor authentication in terms of transmission range and node density.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.173.36

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Azzabi D.; Tanaka K.; Yamamoto U.; Onozato Y. and (2008). AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS.In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008) ISBN 978-989-8111-62-3, pages 47-52. DOI: 10.5220/0002027300470052

@conference{winsys08,
author={Dorsaf Azzabi and Kunihito Tanaka and Ushio Yamamoto and Yoshikuni Onozato},
title={AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)},
year={2008},
pages={47-52},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002027300470052},
isbn={978-989-8111-62-3},
}

TY - CONF

JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)
TI - AUTHENTICATION EMPLOYING NEIGHBOR TABLES IN MOBILE AD HOC NETWORKS
SN - 978-989-8111-62-3
AU - Azzabi, D.
AU - Tanaka, K.
AU - Yamamoto, U.
AU - Onozato, Y.
PY - 2008
SP - 47
EP - 52
DO - 10.5220/0002027300470052

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.