Copyright 2010 world scientific publishing company

Info icon This preview shows pages 21–23. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 21

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Authentication and Confidentiality in Wireless Ad Hoc Networks 9 Nevertheless, the strengths of asymmetric cryptographic techniques have encouraged the researchers to employ the technique for authentication and security of wireless ad hoc networks. Several solutions to the above men- tioned problems have been proposed in the literature. In Section 4.3, we discuss the techniques that focus on the distribution of the certification authority and authentication server within the network nodes. Section 4.4 details the key revocation mechanisms employed in wireless ad hoc net- works. 4.3. Collaborative Mechanisms In this section, we present authentication mechanisms that aim at distribut- ing the role of the certification authority among the participating nodes. The idea of utilizing threshold cryptography for collaborative authenti- cation in ad hoc networks was first proposed by Zhou et al. 11 Since then, a number of distributed neighbor collaboration authentication protocols have been proposed by researchers following a similar approach. 12–14,17 For ex- ample, Deng et al. 17 have proposed threshold cryptography based solution for the distribution of the master key < public key, private key > . A node in the network is authenticated through its private key. In the proposed scheme, all nodes possess the public key while every node has a share of the private key. The (k,n) threshold secret sharing scheme is employed to generate the private key for a node which states that k out of n shares of private key are required to construct the complete private key and less than k shares of the secret key cannot construct the complete private key. Based on this mechanism, whenever a node needs to refresh its private key, it needs k neighbors to send their secret share to the node to reconstruct the private key, and no node can construct the private key based on its own information. The process of private key generation is shown in the Figure 1 where the requesting node broadcasts the REQUEST message along with its own share for verification. The neighboring nodes reply to the REQUEST message by sending their own share of the secret key to the requesting node. The requesting node is then able to generate the private key on receiving k shares of the key. In this way, an intruding node cannot generate the private key unless its own share of private key is verified by k neighboring nodes. Similarly, the private key of a misbehaving node is not refreshed by the neighbors. Therefore, the threshold secret sharing serves as the strong authentication and key management solution.
Image of page 22
Image of page 23
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern