Strong Authentication for Tactical Mobile AD Hoc Networks

PDF

Authors
  1. Tang, H.
  2. Salmanian, M.
  3. Chang, C.
Corporate Authors
Defence R&D Canada - Ottawa, Ottawa ONT (CAN)
Abstract
This document illustrates the challenges of designing non-centralized authentication mechanisms and identifies requirements and steps for strong authentication techniques needed in military tactical operations. The study provides a survey of distributed trust models and authentication in peer-to-peer, wireless, and mobile ad hoc networks (MANETs). We evaluate a select number of existing proposals for authentication in MANETs and find that none of them meets the requirements and steps for strong authentication. We then propose two new schemes based on asymmetric cryptography: public key infrastructure (PKI) and identitybased encryption (IBE). Both schemes use off-line key generation and integrate user and device authentication for authenticating and allowing a node to be added to a trusted routing table. It is believed that the Lightweight Integrated Authentication (LIA) scheme, based on off-line identity-based encryption, should be faster and simpler to implement. The validation of this hypothesis requires that the proposals be further analyzed, prototyped, and trialed.

Il y a un résumé en français ici.

Keywords
Ad Hoc;MANET (Mobile Ad Hoc Network);Authentication;Wireless network security;Cryptography;Biometric user authentication;IBE (Identity-Based Encryption);Tactical MANETs;PKI (Public Key Infrastructure)
Report Number
DRDC-OTTAWA-TM-2007-146 — Technical Memorandum
Date of publication
01 Jul 2007
Number of Pages
53
DSTKIM No
CA029600
CANDIS No
527970
Format(s):
CD ROM

Permanent link

Document 1 of 1

Date modified: