2004
DOI: 10.1007/978-3-540-30121-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Autoconfiguration for MANET Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Two of the aspects to be studied are the form of authentication in the network and the protection of the data that is sent between the different nodes until reaching the final destination. Some authors propose models for authentication and auto-configuration of nodes in MANET networks [19] and even on preventing impersonation attacks using double authentication factor [20]. Apart from this, [21] studies different cryptographic protocols for use in MANETs at the level of energy consumption, which is important in mobile devices, concluding that the AES standard is the one that produces the best performance among the different algorithms analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…Two of the aspects to be studied are the form of authentication in the network and the protection of the data that is sent between the different nodes until reaching the final destination. Some authors propose models for authentication and auto-configuration of nodes in MANET networks [19] and even on preventing impersonation attacks using double authentication factor [20]. Apart from this, [21] studies different cryptographic protocols for use in MANETs at the level of energy consumption, which is important in mobile devices, concluding that the AES standard is the one that produces the best performance among the different algorithms analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper we use the classification proposed by Wang et al [11] and Buiati et al [12] to specify the security threats.…”
Section: Threats In Autoconfigurationmentioning
confidence: 99%
“…Buiati et al [12] propose a secure model for autoconfiguration in MANET, based on a distributed and selforganizing certificate system, and also include intrusion detection techniques to improve its safety. The proposed model is built on the protocol DCDP [14] with the improvements proposed by Mohsin and Prakash [15], adopting a collaborative trust model described as "K-out-of-N." So when a new node wants to enter the network, it must earn the trust of K of the N total nodes in the network in order to be accepted into it.…”
Section: Secure Autoconfigurationmentioning
confidence: 99%
“…Key management service is responsible for keeping track of binding between keys and nodes and for assisting the establishment of mutual trust and secure communication between nodes [9]. Different approaches for key management are listed in [8] including key distribution, key transport, key agreement and key updating. Optional techniques for designing secure key management schemes can be obtained from some successful schemes that have been worked out for wireless networks including ad hoc, sensor, cellular and WiFi.…”
Section: ) Techniquesmentioning
confidence: 99%