Skip to main content

Pre-Authentication and Authentication Models in Ad Hoc Networks

  • Chapter
Wireless Network Security

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the diversity of ad hoc networks, many configuration parameters that are crucial to the security of ad hoc networks are discussed. Special attention is paid to the initial exchange of keys between pairs of nodes (pre-authentication) and the availability of a trusted third party in the network. Next, several pre-authentication and authentication models for ad hoc networks are discussed. The models can be implemented as a part of the proposed security framework and correspond to the wide range of ad hoc network applications. Advantages and disadvantages of the models are analyzed and suitable existing authentication and key exchange protocols are identified for each model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan and P. Ginzboorg, Key Agreement in Ad Hoc Networks, Computer Communications, Vol. 23, No. 17, 2000, pp. 1627–1637.

    Article  Google Scholar 

  2. D. Balfanz, D.K. Smetters, P. Stewart, and H. Chi Wong, Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, Proceedings of Network and Distributed System Security Symposium 2002 (NDSS’ 02), 2002.

    Google Scholar 

  3. S.M. Bellovin and M. Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, Proceedings of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society, ISBN: 0-8186-2825-1, 1992, pp. 72–84.

    Google Scholar 

  4. Bluetooth SIG, Specification of the Bluetooth System, Version 1.1; February 22, 2001, available at http://www.bluetooth.com.

  5. M. Bohge and W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, Proceedings of the 2003 ACM workshop on Wireless security, ISBN:1-58113-769-9, ACM Press, 2003, pp. 79–87.

    Google Scholar 

  6. M. Cagalj, S. Capkun and J.P. Hubaux, Key agreement in peer-to-peer wireless networks, to appear in Proceedings of IEEE, Special Issue on Security and Cryptography, 2005.

    Google Scholar 

  7. S. Čapkun, J.-P. Hubaux, and L. Buttyán, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol. 2, No. 1, 2003, pp. 52–64.

    Article  Google Scholar 

  8. L. Eschenauerand V.D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM conference on Computer and Communications Security, ISBN: 1-58113-612-9, ACM Press, 2002, pp. 41–47.

    Google Scholar 

  9. M. Girault, Self-Certified Public Keys, Advances in Cryptology-EUROCRYPT’ 91, LNCS 547, Springer, 1991, pp. 490–497.

    Google Scholar 

  10. S. Gokhale, and P. Dasgupta, Distributed Authentication for Peer-to-Peer Networks, Symposium on Applications and the Internet Workshops 2003 (SAINT’ 03 Workshops), IEEE Computer Society 2003, ISBN 0-7695-1873-7, 2003, pp. 347–353.

    Google Scholar 

  11. J.P. Hubaux, L. Buttyán and S. Čapkun, The Quest for Security in Mobile Ad Hoc Networks, ACM Symposium on Mobile Networking and Computing-MobiHOC 2001, 2001.

    Google Scholar 

  12. K. Hoeper and G. Gong, Identity-Based Key Exchange Protocol for Ad Hoc Networks, Canadian Workshop of Information Theory-CWIT’ 05, 2005.

    Google Scholar 

  13. K. Hoeper and G. Gong, Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks, Security and Privacy for Emerging Areas in Communication Networks-SecureComm’ 05, 2005.

    Google Scholar 

  14. IEEE 802.11, Standard Specifications for Wireless Local Area Networks, http://standards.ieee.org/wireless/.

  15. A. Khalili, J. Katz, and W. Arbaugh, Toward Secure Key Distribution in Truly Ad-Hoc Networks, 2003 Symposium on Applications and the Internet Workshops (SAINT’ 2003), IEEE Computer Society, ISBN 0-7695-1873-7, 2003, pp. 342–346.

    Google Scholar 

  16. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, International Conference on Network Protocols (ICNP) 2001, 2001.

    Google Scholar 

  17. B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, Secure key issuing in ID-based cryptography, CRPIT’ 04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, Australian Computer Society, Inc., 2004, pp. 69–74.

    Google Scholar 

  18. D. Liu and P. Ning, Location-Based Pairwise Key Establishments for Static Sensor Networks, 1st ACM Workshop Security of Ad Hoc and Sensor Networks (SASN)’ 03, ISBN: 1-58113-783-4, ACM Press, 2003, pp. 72–82.

    Google Scholar 

  19. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-Securing Ad Hoc Wireless Networks, Seventh IEEE Symposium on Computers and Communications (ISCC’ 02), 2002.

    Google Scholar 

  20. A.J. Menezes, P.C. von Orschot, and S.A. Vanstone, Handbook of Applied Cryptography, 1997 by CRC press LLC.

    Google Scholar 

  21. T.S. Messerges, J. Cukier, T.A.M. Kevenaar, L. Puhl, R. Struik, and E. Callaway, A security design for a general purpose, self-organizing, multihop ad hoc wireless network, 1st ACM workshop on Security of ad hoc and sensor networks (SASN)’ 03, ISBN:1-58113-783-4, ACM Press, 2003, pp. 1–11.

    Google Scholar 

  22. A. Shamir, Identity-based Cryptosystems and Signature Schemes, Advances in Cryptology-CRYPTO’ 84, LNCS 196, Springer, 1984, pp. 47–53.

    Google Scholar 

  23. F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks, In Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer, pp. 172–194, 1999.

    Google Scholar 

  24. A. Weimerskirch and D. Westhoff. Zero Common-Knowledge Authentication for Pervasive Networks, Tenth Annual International Workshop on Selected Areas in Cryptography (SAC 2003), 2003.

    Google Scholar 

  25. A. Weimerskirch and D. Westhoff, Identity Certified Authentication for Ad-hoc Networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003, ACM Press, ISBN:1-58113-783-4, 2003, pp. 33–40.

    Google Scholar 

  26. S. Lucks, E. Zenner, A. Weimerskirch, and D. Westhoff, How to Recognise a Stranger — Efficient and Secure Entity Recognition for Low-End Devices, submitted for publication.

    Google Scholar 

  27. L. Zhou and Z.J. Haas, Securing Ad Hoc Networks, IEEE Network Journal, Vol. 13, No. 6, 1999, pp. 24–30.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Hoeper, K., Gong, G. (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-33112-6_3

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-28040-0

  • Online ISBN: 978-0-387-33112-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics