Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Modelling reputation-based resource pooling in P2P systems
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Towards distributed service provisioning
Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
A public key infrastructure is generally (andeffectively) used for cryptographically secureauthentication in the networks. Ad-hoc networks areformed in haphazard manner. Security services for ad-hoc networks cannot assume the existence of aparticular infrastructure. Peer-to-peer technology ispromising in addressing security issues in ad-hocnetworks. We provide a novel; cryptographicallysecure representation of trust based on secure groups -troups. We show how troups can be constructed in adistributed manner using RSA accumulators. Thetroup-membership is verified using the zero-knowledgeprotocol of modular exponentiation. Each node in agroup has an identity within a group, but it is notrequired to reveal the identity during verification. Thistrust model is not centrally controlled and can bedeployed incrementally in the network. This paperpresents the protocols and a prototype implementationof the troups based authentication system.