UGSP: AUTHENTICATION BASED SECURE PROTOCOL FOR AD-HOC NETWORKS

Neelima Arora, R. K. Shyamasundar

2004

Abstract

A wireless ad-hoc network is a collection of mobile nodes with no fixed infrastructure. Security in such networks poses serious challenges due to (i) the network connectivity could be intermittent and hence on-line authentication is not guaranteed, and (ii) susceptible to wide range of attacks due to broadcast communication and large scale number of users. In this paper, we propose a security protocol, called UGSP, for wireless ad-hoc networks using a tamper-proof hardware. We show that the proposed protocol fits well with the resurrecting duckling security paradigm (Stajano and Anderson, 1999). Once the hardware is imprinted for authentication, UGSP is robust to man-in-the-middle attack, passive eavesdropping, active impersonation attacks ensuring source authentication, data confidentiality and data integrity for communication amongst nodes with identically configured hardware. The system is amenable to dynamic addition of new members whose hardware has also been imprinted with authentication information. We provide a comparative evaluation of UGSP with other approaches and show that UGSP is scalable and cost-effective.

References

  1. Bobba, R. B., Eschenauer, L., Gligor, V., and Arbaugh, W. A. (2002). Bootstrapping security associations for routing in mobile ad-hoc networks. In Technical Report, Institute for Systems and Research, UMD, TR 2002-44.
  2. Hu, Y., Johnson, D., and Perrig, A. (2002). Sead: Secure ef cient distance vector routing for mobile wireless ad hoc networks. In Workshop on Mobile Computing Systems and Applications, IEEE.
  3. Hu, Y.-C. and Perrig, A. (2002). Ariadne: A secure ondemand routing protocol for ad hoc networks. In Mobicom.
  4. Khaili, A. and Arbaugh, W. A. (2002). curity of wireless ad hoc networks. http://www.cs.umd.edu/ aram/wireless/survey.pdf.
  5. Khalili, A. and Arbaugh, W. (2003). Toward secure key distribution in truly ad-hoc networks. In IEEE Workshop on Security and Assurance in Ad-Hoc Networks.
  6. Lamport, L. (1981). Password authentication with insecure communication. In Communications of the ACM, pg. 770-771, Number 81, Volume 24.
  7. Papadimitratos, P. and Haas, Z. (2002). Secure routing for mobile adhoc networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference.
  8. Perrig, A., Canetti, R., Tygar, J., and Song, D. (2002a). The tesla broadcast authentication protocol. In RSA Cryptobytes.
  9. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., and Culler, D. E. (2002b). Spins: Security protocols for sensor networks. In Wireless Network Journal (WINE).
  10. Royer, E. M. and Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. In IEEE Personal communications.
  11. Stajano, F. and Anderson, R. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 3rd AT & T Software Symposium.
  12. Toh, C. K. (2001). Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks. In IEEE Communications Magazine.
  13. Zhou, L. and Haas, Z. (1999). Securing ad hoc networks. In IEEE Network Magazine, 13(6).
Download


Paper Citation


in Harvard Style

Arora N. and K. Shyamasundar R. (2004). UGSP: AUTHENTICATION BASED SECURE PROTOCOL FOR AD-HOC NETWORKS . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE, ISBN 972-8865-15-5, pages 191-196. DOI: 10.5220/0001400601910196


in Bibtex Style

@conference{icete04,
author={Neelima Arora and R. K. Shyamasundar},
title={UGSP: AUTHENTICATION BASED SECURE PROTOCOL FOR AD-HOC NETWORKS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,},
year={2004},
pages={191-196},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001400601910196},
isbn={972-8865-15-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,
TI - UGSP: AUTHENTICATION BASED SECURE PROTOCOL FOR AD-HOC NETWORKS
SN - 972-8865-15-5
AU - Arora N.
AU - K. Shyamasundar R.
PY - 2004
SP - 191
EP - 196
DO - 10.5220/0001400601910196