Skip to main content
Erschienen in: Mobile Networks and Applications 1/2016

01.02.2016

Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks

verfasst von: Parisa Memarmoshrefi, Roman Seibel, Dieter Hogrefe

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide authentication, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are not viable for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized and localized public key authentication mechanism based on ant colony systems. Every node generates its own public-private key pair, issues certificates to neighboring nodes and provides on-demand authentication services by means of gathering certificate chains towards a target node. Pheromone concentration left by ants along the path of the certificate chains represents the trust level of a node towards other nodes. This model is able to authenticate public keys by selecting the most trustworthy certificate chains gathered by ants and can identify and exclude certificate chains with malicious nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Hashmi S, Brooke J (2008) Authentication mechanisms for mobile ad-hoc networks and resistance to sybil attack. Proc Second Int Conf Emerg Secur Inf Syst Technol IEEE Comput Soc Hashmi S, Brooke J (2008) Authentication mechanisms for mobile ad-hoc networks and resistance to sybil attack. Proc Second Int Conf Emerg Secur Inf Syst Technol IEEE Comput Soc
2.
Zurück zum Zitat Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556CrossRef Mármol FG, Pérez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28(7):545–556CrossRef
3.
Zurück zum Zitat Cordon O, Herrera F, Stützle T (2002) A review on the ant colony optimization metaheuristic: basis, models and new trends. Math Soft Comput Cordon O, Herrera F, Stützle T (2002) A review on the ant colony optimization metaheuristic: basis, models and new trends. Math Soft Comput
4.
Zurück zum Zitat Zimmermann P (1995) The official pgp user’s guide. MIT Press Zimmermann P (1995) The official pgp user’s guide. MIT Press
5.
Zurück zum Zitat Capkun S, Buttyan L, Hubaux J-P (2003) Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mob Comput 52–64 Capkun S, Buttyan L, Hubaux J-P (2003) Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mob Comput 52–64
6.
Zurück zum Zitat Li R, Li J, Liu P, Chen H (2006) On-demand public-key management for mobile ad hoc networks: research articles. Wirel Commun Mob Comput 6:295–306CrossRef Li R, Li J, Liu P, Chen H (2006) On-demand public-key management for mobile ad hoc networks: research articles. Wirel Commun Mob Comput 6:295–306CrossRef
7.
Zurück zum Zitat Dahshan H, Irvine J (2010) A robust self-organized public key management for mobile ad hoc networks. Secur Commun Netw 16–30 Dahshan H, Irvine J (2010) A robust self-organized public key management for mobile ad hoc networks. Secur Commun Netw 16–30
8.
Zurück zum Zitat Dahshan H, Irvine J (2009) On demand self-organized public key management for mobile ad hoc networks. IEEE 69th Vehicular Technology Conferece Dahshan H, Irvine J (2009) On demand self-organized public key management for mobile ad hoc networks. IEEE 69th Vehicular Technology Conferece
9.
Zurück zum Zitat Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 618–644 Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 618–644
10.
Zurück zum Zitat Marti S, Garciamolina H (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 472–484 Marti S, Garciamolina H (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 472–484
11.
Zurück zum Zitat Kamvar S, Schlosser M, Garcia-Molina H (2003) The Eigentrust Algorithm for Reputation Management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW ‘03). Budapest, Hungary: ACM Kamvar S, Schlosser M, Garcia-Molina H (2003) The Eigentrust Algorithm for Reputation Management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW ‘03). Budapest, Hungary: ACM
12.
Zurück zum Zitat Mármol FG, Pérez GM, Skarmeta AFG (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 1:153–164CrossRef Mármol FG, Pérez GM, Skarmeta AFG (2009) TACS, a trust model for P2P networks. Wirel Pers Commun 1:153–164CrossRef
13.
Zurück zum Zitat Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems
14.
Zurück zum Zitat Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security 107–121 Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security 107–121
15.
Zurück zum Zitat Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM: Washington DC, USA 66–77 Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM: Washington DC, USA 66–77
16.
Zurück zum Zitat Boukerch A, Xu L, Khatib E (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(p):2413–2427CrossRef Boukerch A, Xu L, Khatib E (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(p):2413–2427CrossRef
17.
Zurück zum Zitat Wang W, Zeng G, Yuan L (2006) Ant-based reputation evidence distribution in P2P networks. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing. IEEE Comp Soc 129–132 Wang W, Zeng G, Yuan L (2006) Ant-based reputation evidence distribution in P2P networks. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing. IEEE Comp Soc 129–132
18.
Zurück zum Zitat Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. IEEE Comput Soc 7:588–593 Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. IEEE Comput Soc 7:588–593
19.
Zurück zum Zitat Jøsang A, Golbeck J (2009) Challenges for robust of trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, Saint Malo, France Jøsang A, Golbeck J (2009) Challenges for robust of trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, Saint Malo, France
20.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems. Springer-Verlag 251–260 Douceur JR (2002) The sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems. Springer-Verlag 251–260
Metadaten
Titel
Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks
verfasst von
Parisa Memarmoshrefi
Roman Seibel
Dieter Hogrefe
Publikationsdatum
01.02.2016
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2016
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0703-y

Weitere Artikel der Ausgabe 1/2016

Mobile Networks and Applications 1/2016 Zur Ausgabe