By Topic

Opportunistic node authentication in intermittently connected mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yaozhou Ma ; School of Electrical and Information Engineering, The University of Sydney, NSW 2006, Australia ; Abbas Jamalipour

Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically employment of mobility nature of nodes and the storage space of all nodes. However, due to intermittent connectivity, security schemes introduced for the conventional mobile ad hoc networks (MANETs) cannot be directly deployed over ICMANs for node authentication. Therefore, this paper adopts the nodes' mobilities to implement the (t, n) threshold secret sharing and identity-based cryptography (IBC) over ICMANs. Such (t, n) based IBC can subsequently be utilized to facilitate node authentication to defend against the malicious attacks in the ICMANs context. In the proposed security scheme, the master private key of IBC is shared by n distributed private key generators (PKGs), while each node needs to employ its mobility nature to contact at least t-out-of-n PKGs to reconstruct its own private key. To overcome the routing-security interdependence cycle, only face-to-face based node authentication is employed. In other words, authentication and key establishment between nodes and distributed PKGs is only allowed whenever they encounter each other directly. Delay performance of such (t, n) based IBC in the ICMANs context is accordingly modeled and evaluated.

Published in:

2010 16th Asia-Pacific Conference on Communications (APCC)

Date of Conference:

Oct. 31 2010-Nov. 3 2010