About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
6th International ICST Symposium on Modeling and Optimization

Research Article

Self-Organized Authentication Architecture for Mobile Ad-hoc Networks

Download741 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.3019,
        author={P. Caballero-Gil and C. Caballero-Gil and J. Molina-Gil and C. Hernandez-Goya},
        title={Self-Organized Authentication Architecture for Mobile Ad-hoc Networks},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={Access control Ad hoc networks Authentication Broadcasting Computer architecture Mobile computing Network topology Operations research Proposals Statistics},
        doi={10.4108/ICST.WIOPT2008.3019}
    }
    
  • P. Caballero-Gil
    C. Caballero-Gil
    J. Molina-Gil
    C. Hernandez-Goya
    Year: 2008
    Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.3019
P. Caballero-Gil1,*, C. Caballero-Gil2,*, J. Molina-Gil2,*, C. Hernandez-Goya1,*
  • 1: Dept. Statistics, Operations Research and Computing. University of La Laguna. 38271 La Laguna. Tenerife. Spain.
  • 2: Dept. Informatics and Systems. University of Las Palmas de Gran Canaria. 35017 Las Palmas de Gran Canaria.Gran Canaria. Spain.
*Contact email: pcaballe@ull.es, candido.caballero@gmail.com, jezabelmiriam@gmail.com, mchgoya@ull.es

Abstract

This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully distributed and self-organized authentication. In this paper apart from describing all the GASMAN components, special emphasis is placed on proving that it fulfils every requirement of a secure distributed authentication scheme, including limited physical protection of broadcast medium, frequent route changes caused by mobility, lack of structured hierarchy, etc. Furthermore, an extensive analysis through simulation experiments in different scenarios is described and discussed.

Keywords
Access control Ad hoc networks Authentication Broadcasting Computer architecture Mobile computing Network topology Operations research Proposals Statistics
Published
2008-08-01
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.4108/ICST.WIOPT2008.3019
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL