The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Secure Multipath Communication in Mobile Ad hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Secure Multipath Routing for Mobile Ad Hoc Networks
WONS '05 Proceedings of the Second Annual Conference on Wireless On-demand Network Systems and Services
A survey of active network research
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
A flexible privacy and trust based context-aware secure framework
ICOST'10 Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics
Context-Enhanced authentication for infrastructureless network environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Existing MANET authentication schemes cannot fully protect nodes from well-known impersonation attacks. Although these schemes cryptographically link an entity to a claimed identity, the actual entity is never linked to the physical node device. However, the link is implicitly assumed. This shortcoming may be easily exploited within a MANET setting, due to the broadcast nature of the access medium. In this paper we propose a multifactor authentication framework that extends the cryptographic link, binding an entity to a physical node device. This is achieved by using two distinct authentication factors; certified keys and certified node characteristics. Although the proposed framework requires additional sensing capabilities from the MANET nodes, it provides the additional confidence level required for node authentication in critical applications.