Abstract
Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the diversity of ad hoc networks, many configuration parameters that are crucial to the security of ad hoc networks are discussed. Special attention is paid to the initial exchange of keys between pairs of nodes (pre-authentication) and the availability of a trusted third party in the network. Next, several pre-authentication and authentication models for ad hoc networks are discussed. The models can be implemented as a part of the proposed security framework and correspond to the wide range of ad hoc network applications. Advantages and disadvantages of the models are analyzed and suitable existing authentication and key exchange protocols are identified for each model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
N. Asokan and P. Ginzboorg, Key Agreement in Ad Hoc Networks, Computer Communications, Vol. 23, No. 17, 2000, pp. 1627–1637.
D. Balfanz, D.K. Smetters, P. Stewart, and H. Chi Wong, Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, Proceedings of Network and Distributed System Security Symposium 2002 (NDSS’ 02), 2002.
S.M. Bellovin and M. Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, Proceedings of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society, ISBN: 0-8186-2825-1, 1992, pp. 72–84.
Bluetooth SIG, Specification of the Bluetooth System, Version 1.1; February 22, 2001, available at http://www.bluetooth.com.
M. Bohge and W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, Proceedings of the 2003 ACM workshop on Wireless security, ISBN:1-58113-769-9, ACM Press, 2003, pp. 79–87.
M. Cagalj, S. Capkun and J.P. Hubaux, Key agreement in peer-to-peer wireless networks, to appear in Proceedings of IEEE, Special Issue on Security and Cryptography, 2005.
S. Čapkun, J.-P. Hubaux, and L. Buttyán, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol. 2, No. 1, 2003, pp. 52–64.
L. Eschenauerand V.D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM conference on Computer and Communications Security, ISBN: 1-58113-612-9, ACM Press, 2002, pp. 41–47.
M. Girault, Self-Certified Public Keys, Advances in Cryptology-EUROCRYPT’ 91, LNCS 547, Springer, 1991, pp. 490–497.
S. Gokhale, and P. Dasgupta, Distributed Authentication for Peer-to-Peer Networks, Symposium on Applications and the Internet Workshops 2003 (SAINT’ 03 Workshops), IEEE Computer Society 2003, ISBN 0-7695-1873-7, 2003, pp. 347–353.
J.P. Hubaux, L. Buttyán and S. Čapkun, The Quest for Security in Mobile Ad Hoc Networks, ACM Symposium on Mobile Networking and Computing-MobiHOC 2001, 2001.
K. Hoeper and G. Gong, Identity-Based Key Exchange Protocol for Ad Hoc Networks, Canadian Workshop of Information Theory-CWIT’ 05, 2005.
K. Hoeper and G. Gong, Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks, Security and Privacy for Emerging Areas in Communication Networks-SecureComm’ 05, 2005.
IEEE 802.11, Standard Specifications for Wireless Local Area Networks, http://standards.ieee.org/wireless/.
A. Khalili, J. Katz, and W. Arbaugh, Toward Secure Key Distribution in Truly Ad-Hoc Networks, 2003 Symposium on Applications and the Internet Workshops (SAINT’ 2003), IEEE Computer Society, ISBN 0-7695-1873-7, 2003, pp. 342–346.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, International Conference on Network Protocols (ICNP) 2001, 2001.
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, Secure key issuing in ID-based cryptography, CRPIT’ 04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, Australian Computer Society, Inc., 2004, pp. 69–74.
D. Liu and P. Ning, Location-Based Pairwise Key Establishments for Static Sensor Networks, 1st ACM Workshop Security of Ad Hoc and Sensor Networks (SASN)’ 03, ISBN: 1-58113-783-4, ACM Press, 2003, pp. 72–82.
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-Securing Ad Hoc Wireless Networks, Seventh IEEE Symposium on Computers and Communications (ISCC’ 02), 2002.
A.J. Menezes, P.C. von Orschot, and S.A. Vanstone, Handbook of Applied Cryptography, 1997 by CRC press LLC.
T.S. Messerges, J. Cukier, T.A.M. Kevenaar, L. Puhl, R. Struik, and E. Callaway, A security design for a general purpose, self-organizing, multihop ad hoc wireless network, 1st ACM workshop on Security of ad hoc and sensor networks (SASN)’ 03, ISBN:1-58113-783-4, ACM Press, 2003, pp. 1–11.
A. Shamir, Identity-based Cryptosystems and Signature Schemes, Advances in Cryptology-CRYPTO’ 84, LNCS 196, Springer, 1984, pp. 47–53.
F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks, In Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer, pp. 172–194, 1999.
A. Weimerskirch and D. Westhoff. Zero Common-Knowledge Authentication for Pervasive Networks, Tenth Annual International Workshop on Selected Areas in Cryptography (SAC 2003), 2003.
A. Weimerskirch and D. Westhoff, Identity Certified Authentication for Ad-hoc Networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003, ACM Press, ISBN:1-58113-783-4, 2003, pp. 33–40.
S. Lucks, E. Zenner, A. Weimerskirch, and D. Westhoff, How to Recognise a Stranger — Efficient and Secure Entity Recognition for Low-End Devices, submitted for publication.
L. Zhou and Z.J. Haas, Securing Ad Hoc Networks, IEEE Network Journal, Vol. 13, No. 6, 1999, pp. 24–30.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Hoeper, K., Gong, G. (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-33112-6_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-28040-0
Online ISBN: 978-0-387-33112-6
eBook Packages: EngineeringEngineering (R0)