6th International ICST Symposium on Modeling and Optimization

Research Article

Self-Organized Authentication Architecture for Mobile Ad-hoc Networks

Download519 downloads
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.3019,
        author={P. Caballero-Gil and C. Caballero-Gil and J. Molina-Gil and C. Hernandez-Goya},
        title={Self-Organized Authentication Architecture for Mobile Ad-hoc Networks},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={Access control Ad hoc networks Authentication Broadcasting Computer architecture Mobile computing Network topology Operations research Proposals Statistics},
        doi={10.4108/ICST.WIOPT2008.3019}
    }
    
  • P. Caballero-Gil
    C. Caballero-Gil
    J. Molina-Gil
    C. Hernandez-Goya
    Year: 2008
    Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.3019
P. Caballero-Gil1,*, C. Caballero-Gil2,*, J. Molina-Gil2,*, C. Hernandez-Goya1,*
  • 1: Dept. Statistics, Operations Research and Computing. University of La Laguna. 38271 La Laguna. Tenerife. Spain.
  • 2: Dept. Informatics and Systems. University of Las Palmas de Gran Canaria. 35017 Las Palmas de Gran Canaria.Gran Canaria. Spain.
*Contact email: pcaballe@ull.es, candido.caballero@gmail.com, jezabelmiriam@gmail.com, mchgoya@ull.es

Abstract

This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully distributed and self-organized authentication. In this paper apart from describing all the GASMAN components, special emphasis is placed on proving that it fulfils every requirement of a secure distributed authentication scheme, including limited physical protection of broadcast medium, frequent route changes caused by mobility, lack of structured hierarchy, etc. Furthermore, an extensive analysis through simulation experiments in different scenarios is described and discussed.