Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A global authentication scheme for mobile ad-hoc networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A simulation study of new security schemes in mobile ad-hoc networks
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Self-organizing life cycle management of mobile ad hoc networks
Security and Communication Networks
Hi-index | 0.00 |
Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most fundamental problem that has to be solved before any others. Some previous solutions requiring centralized entities were not scalable and others requiring physical encounter took a long time. We propose a new architecture, called the Secure Overlay Network (SON), for fully distributed authentication. The SON has scalability because it is constructed in a self-organizing manner. The SON also has NPC-reachability which makes the SON robust against Sybil attacks, and guarantees authentication service between any two nodes in the SON. Both NPC-reachability and simulation results confirm the effectiveness of our architecture.