CFP last date
20 January 2025
Reseach Article

Authentication Schemes for Open Distributed Network: A Classification

by Deepak Kumar, Vinod Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 14
Year of Publication: 2013
Authors: Deepak Kumar, Vinod Kumar
10.5120/13181-0855

Deepak Kumar, Vinod Kumar . Authentication Schemes for Open Distributed Network: A Classification. International Journal of Computer Applications. 75, 14 ( August 2013), 24-29. DOI=10.5120/13181-0855

@article{ 10.5120/13181-0855,
author = { Deepak Kumar, Vinod Kumar },
title = { Authentication Schemes for Open Distributed Network: A Classification },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 14 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number14/13181-0855/ },
doi = { 10.5120/13181-0855 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:44:17.253507+05:30
%A Deepak Kumar
%A Vinod Kumar
%T Authentication Schemes for Open Distributed Network: A Classification
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 14
%P 24-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized . Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a Distributed Network like ad hoc networks are deployed in untrusted environments. Therefore, authentication is a pioneer to any secure interactions in these networks. Recently, various authentication protocols have been proposed for ad hoc networks. In distributed authentication services in ad hoc networks. Two nodes authenticate each other via signed, unforgivable certi?cates released by a"virtual"trusted certi?cation authority. Compared with regular network authentication solutions [28, 29] that rely on physically present, third-party trusted (certi?cation authority) server(s), our design takes a self organized securing approach, in which multiple nodes (say, k) collaboratively serve the role of a certi?cation authority server. Therefore, the authority and functionality of the authentication server are spread to each node's locality. Any local k nodes are trusted as a whole and collaboratively provide authentication services. This paper describes the authentication procedure and a classification that clarifies similarities and differences among authentication protocol described in the literature. The classification is based upon the role of nodes in the authentication function, establishment of certificate, and type of certificate.

References
  1. S. Zhu, S. Xu, S. Setia and S. Jajodia, "LHAP: A lightweight hop-by-hop authentication protocol for ad- hoc networks. " In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003.
  2. A. Weimerskirch and G. Thonet, "A Distributed Light-Weight Authentication Model for Ad-hoc Networks. " In Proc. of 4th International Conference on Information Security and Cryptology (ICISC 2001), 6-7 December 2001.
  3. D. Balfanz, D. K. Smetters, P. Stewart and H. Chi. Wong, Talking to Strangers: Authentication in Ad- Hoc Wireless Networks. " In Symposium on Network and Distributed Systems Security (NDSS '02).
  4. L. Venkatraman and D. Agrawal, "A Novel Authentication cheme for Ad Hoc Networks. " In IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, pp. 1268--1273, 2000.
  5. H. Deng, A. Mukherjee, D. P. Agrawal, "Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks. " International Conference on Information Technology: Coding and Computing (ITCC'04).
  6. S. Zhu, S. Setia and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. " In 10th ACM Conference on Computer and Communications Security (CCS '03).
  7. D. Park, C. Boyd, E. Dawson. "Classification of Authentication Protocols: A Practical Approach. " Proceedings of the Third International Workshop on Information Security.
  8. A Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, "SPINS: Security Protocols for Sensor Networks. " In Proc. Of ACM Mobicom'01.
  9. Edith C. H. Ngai and Michael R. Lyu, "Trust- and Clustering- based Authentication Services in Mobile Ad Hoc Networks. " In Proc. of 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW'04).
  10. Edith C. H. Ngai and Michael R. Lyu and Roland T. Chin, "An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks. " In Proc. of 2004 IEEE Aerospace Conference, March 6-13 2004.
  11. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. " In M. Roe B. Christianson, B. Crispo, editor, Security Protocols, 7th International Workshop Proceedings, LectureNotes in Computer Science. Springer Verlag, 1999.
  12. IEEE Std 802. 11a-1999 Supplement to IEEE standard for information technology telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements. Part 11: wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: high-speed physical layer in the 5 GHz band
  13. A. Weirmerskirch and D. Westhoff, "Identity Certified Authentication for Ad-hoc Networks. " In Proc. of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, VA USA.
  14. S. Gokhale and P. Dasgupta, "Distributed Authentication or Peer-to-Peer Networks", In Symposium on Applications and the Internet Workshops 2003 (SAINT'03 Workshops).
  15. R. Yahalom, B. Klein, Th. Beth, "Trust Relationships in Secure Systems- A Distributed Authentication Perspective. " In Proc. of the 1993 IEEE Symposium on Security and Privacy,CA USA.
  16. L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks. " IEEE Network Journal, vol. 13, no. 6,1999, pp. 24-30.
  17. A. A. Pirzada, C. McDonald, "Kerberos Assisted Authentication in Mobile Ad hoc Networks. " Proceedings of the 27th conference on Australasian computer science.
  18. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self- Securing Ad Hoc Wireless Networks. " In Seventh IEEE Symposium on Computers and Communications (ISCC '02),2002
  19. S. Hahm, Y. Jung, S. Yi, Y. Song, I. Chong, and K. Lim, "A Self-organized Authentication Architecture in Mobile Ad-hoc Networks. " International Conference on Information Networking (ICOIN) 2005.
  20. Clark and J. Jacob, "A Survey of Authentication Protocol Literature: Version 1. 0", 17 November 1997.
  21. S. Basagni and K. Herrin, "Secure pebblenets. " In Proc. of the 2nd ACM international symposium on Mobile ad hoc networking & computing, 2001.
  22. A. Perrig, R. Canetti, J. Tygar, D. Song, "Efficient authentication and signing of multicast streams over lossy channels. " In Proc. of IEEE Symposium on Security and Privacy, May 2000.
  23. Wenliang Du, RonghuaWang, and Peng Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks. " In Proc. of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005.
  24. M. Bechler, H. -J. Hof†, D. Kraft, F. Pählke, L. Wolf "A Cluster-Based Security Architecture for Ad Hoc Networks" INFOCOM 2004.
  25. J. Binder and H-P. Bischof, "Zero knowledge proofs of identity for ad hoc wireless networks. "2003.
  26. A. Fritz and J. -F. Pâris, "Maille Authentication: A Novel Protocol for Distributed Authentication. " In Proc. of the 19th IFIP Information Security Conference (SEC 2004), Toulouse, France, Aug. 2004, pages 309–322.
  27. M. Tamer Refaei, V. Srivastava, L. DaSilva, and M. Eltoweissy "A Reputation-based mechanism for Isolating Selfish Nodes in Ad Hoc networks". In Proc. of the IEEE Mobiquitous 2005, San Diego, CA.
  28. A. Aresenault and S. Turner, "Internet X. 509 public key infrastructure," draft-ietf-pkix-roadmap-06. txt, 2000
  29. R. Perlman, "An overview of PKI trust models", IEEE Network, p. 38-43, vol. 13, (no. 6) Nov. -Dec. 1999
  30. L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24–30, 1999.
  31. Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Net- works," in Proc. MobiCom, Aug. 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Routing Authentication certification Security Validation.