International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 75 - Number 14 |
Year of Publication: 2013 |
Authors: Deepak Kumar, Vinod Kumar |
10.5120/13181-0855 |
Deepak Kumar, Vinod Kumar . Authentication Schemes for Open Distributed Network: A Classification. International Journal of Computer Applications. 75, 14 ( August 2013), 24-29. DOI=10.5120/13181-0855
An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized . Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a Distributed Network like ad hoc networks are deployed in untrusted environments. Therefore, authentication is a pioneer to any secure interactions in these networks. Recently, various authentication protocols have been proposed for ad hoc networks. In distributed authentication services in ad hoc networks. Two nodes authenticate each other via signed, unforgivable certi?cates released by a"virtual"trusted certi?cation authority. Compared with regular network authentication solutions [28, 29] that rely on physically present, third-party trusted (certi?cation authority) server(s), our design takes a self organized securing approach, in which multiple nodes (say, k) collaboratively serve the role of a certi?cation authority server. Therefore, the authority and functionality of the authentication server are spread to each node's locality. Any local k nodes are trusted as a whole and collaboratively provide authentication services. This paper describes the authentication procedure and a classification that clarifies similarities and differences among authentication protocol described in the literature. The classification is based upon the role of nodes in the authentication function, establishment of certificate, and type of certificate.