AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks

A. M. Hamad, W. I. Khedr

Abstract

A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in mobile ad hoc networks have limited capabilities and dynamic topology. Authentication of network nodes and the establishment of secret keys among nodes are both target security objectives in ad hoc networks. The constrained devices and other special properties of ad hoc networks make achieving those security properties a challenging task. This paper proposes an authentication protocol, Ad-hoc On Demand Authentication Chain Protocol (AOAC), which allow individual node to authenticate each other and to establish a shared key for secure peer-to-peer communication, the authentication does not rely on any centralize trusted authority or fixed server and is not based on public key cryptography. To provide both node authentication and pair-wise authenticated key establishment we proposed a transitive authentication technique by which active attacks, specially the man-in-the-middle attack, can be prevented. The security of our protocol is analyzed using GNY logic. We also provided simulation and performance analysis of the proposed authentication protocol.

References

  1. C. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks - Architectures and Protocols: Person Education, 2004.
  2. L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, pp. 24-30, 1999.
  3. J. Kong, P. Zerfos, S. L. H. Luo, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad hoc networks," presented at IEEE ICNP, 2001.
  4. M. Narasimha, G. Tsudik, and J. H. Yi, "On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control," presented at IEEE ICNP, 2003.
  5. H. Luo, P. Zerfos, J. Kong, and L. Z. S. Lu, "Self-securing Ad Hoc Wireless Networks," presented at ISCC, 2002.
  6. A. M. Hamad, T. I. El-Areef, M. A. Shouman, and W. I. Khedr, "Local Broadcast and Transitive Authentication Based Key Establishment Scheme for Wireless Ad-hoc Network," the Egyptian Informatics Journal,, June 2008a.
  7. A. M. Hamad, T. I. El-Areef, M. A. Shouman, and W. I. Khedr, "Key Establishment Protocols for Wireless Sensor Networks," the International Journal of Intelligent Computing and Information Sciences ,January 2008b.
  8. P. R. J. Östergård, "A fast algorithm for the maximum clique problem," Discrete Applied Mathematics vol. 120, pp. 197-207, 2002.
  9. W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks," presented at Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing Urbana-Champaign, IL, USA 2005.
  10. L. Gong, R. Needham, and R. Yahalom, "Reasoning about Belief in Cryptographic Protocols," presented at IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1990.
  11. E. Saul and A. C. M. Hutchison, "Using GYPSIE, GYNGER and Visual GNY to Analyze Cryptographic Protocols in SPEAR II," presented at Eighth Annual Working Conference on Information Security Management and Small Systems Security, Las Vegas, Nevada, September 2001.
  12. Silva, W. P., and C. M. D. P. S. Silva, "LAB Fit Curve Fitting Software (Nonlinear Regression and Treatment of Data Program) V 7.2.39 (1999-2007), online, available from world wide web: http://www.angelfire.com/rnb/labfit/."
Download


Paper Citation


in Harvard Style

M. Hamad A. and I. Khedr W. (2009). AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 274-284. DOI: 10.5220/0002235102740284


in Bibtex Style

@conference{secrypt09,
author={A. M. Hamad and W. I. Khedr},
title={AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={274-284},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002235102740284},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
SN - 978-989-674-005-4
AU - M. Hamad A.
AU - I. Khedr W.
PY - 2009
SP - 274
EP - 284
DO - 10.5220/0002235102740284