Abstract
In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commercial transactions. After a brief introduction to the ad-hoc networking paradigm we give a survey of various existing models and analyze them in terms of scope and applications. It is concluded that no appropriate and satisfactory model for low-value transactions in ad-hoc networks has been developed to date. Our new model is derived from previous models dealing with trust and security in ad-hoc networks, and does not require devices with strong processors as public-key systems. We base the model on a recommendation and reference protocol that is inspired by human behavior and that is in accordance with the very nature of ad-hoc networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A. Abdul-Rahman and S. Hailes. A Distributed Trust Model. New Security Paradigms Workshop 1997, ACM, 1997.
R. Anderson and M. Kuhn. Tamper resistance-a cautionary note. 2nd USENIX Workshop on Electronic Commerce, 1996.
N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications 23, 2000.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. The 17th Symposium on Security and Privacy, IEEE Computer Society Press, 1996.
L. Buttyán and J.-P. Hubaux. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology-Lausanne, Department of Communication Systems, 2001.
Y. Desmedt and Y. Frankel. Threshold cryptosystems. Advances in Cryptology-Crypto’ 89, LNCS 435, Springer-Verlag, 1990.
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. Advances in Cryptology-Eurocrypt’ 96, LNCS 1070, Springer-Verlag, 1996.
G. Horn and B. Preneel. Authentication and Payment in Future Mobile Systems. Computer Security-ESORICS’ 98, LNCS 1485, Springer-Verlag, 1998.
J.-P. Hubaux, L. Buttyán, and S. Čapkun. The Quest for Security in Mobile Ad Hoc Networks. ACM Symposium on Mobile Ad Hoc Networking and Computing-MobiHOC 2001, 2001.
HiperLAN2 Global Forum. URL: http://www.hiperlan2.com. Work in progress.
IEEE Computer Society LAN/MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-IEEE 802.11. 1997.
A. Jøsang. The right type of trust for distributed systems. New Security Paradigms Workshop 1996, ACM, 1996.
J. Jubin and J.D. Tornow. The DARPRA Packet Radio Network Protocol. Proc. IEEE, vol. 75, no. 1, 1987.
A. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997.
Mobile Ad-hoc Networks (MANET). URL: http://www.ietf.org/html.charters/manet-charter.html. Work in progress.
F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. The 7th International Workshop on Security Protocols, LNCS 1796, Springer-Verlag, 1999.
F. Stajano. The Resurrecting Duckling-what next? The 8 th International Workshop on Security Protocols, LNCS 2133, Springler-Verlag, 2000.
B. Warneke, M. Last, B. Leibowitz, and K.S.J. Pister. Smart Dust: Communicating with a Cubic-Millimeter Computer. Computer Magazine, IEEE, Jan. 2001.
D. Watts and S. Strogatz. Collective dynamics of’ small-world’ networks. Nature 393, 1998.
L. Zhou and Z.J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no. 6, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weimerskirch, A., Thonet, G. (2002). A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_26
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive