Authors:
A. M. Hamad
1
and
W. I. Khedr
2
Affiliations:
1
British University in Egypt (BUE), Egypt
;
2
Zagazig University, Egypt
Keyword(s):
Mobile ad-hoc networks, Authentication, Man-in-the-middle attack, Key establishment, Transitive authentication.
Related
Ontology
Subjects/Areas/Topics:
Cryptographic Techniques and Key Management
;
Information and Systems Security
;
Mobile System Security
;
Network Security
;
Peer-To-Peer Security
;
Public Key Crypto Applications
;
Sensor and Mobile Ad Hoc Network Security
;
Wireless Network Security
Abstract:
A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in mobile ad hoc networks have limited capabilities and dynamic topology. Authentication of network nodes and the establishment of secret keys among nodes are both target security objectives in ad hoc networks. The constrained devices and other special properties of ad hoc networks make achieving those security properties a challenging task. This paper proposes an authentication protocol, Ad-hoc On Demand Authentication Chain Protocol (AOAC), which allow individual node to authenticate each other and to establish a shared key for secure peer-to-peer communication, the authentication does not rely on any centralize trusted authority or fixed server and is not based on public key cryptography. To provide both node authentication and pair-wise authenticated key establishment we proposed a transitive authentication technique by which active attacks, specially the man-in-the-middle attack,
can be prevented. The security of our protocol is analyzed using GNY logic. We also provided simulation and performance analysis of the proposed authentication protocol.
(More)