PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Wybrane rozwiązania uwierzytelniania węzłów taktycznej sieci ad-hoc

Autorzy
Identyfikatory
Warianty tytułu
EN
Survey on authentication solutions for tactical ad-hoc network nodes
Języki publikacji
PL
Abstrakty
PL
Dokonano przeglądu wybranych rozwiązań w zakresie uwierzytelniania elementów taktycznej sieci ad-hoc. Opis koncepcji, mechanizmów i protokołów uwierzytelniania poprzedzono charakterystyką środowiska sieci taktycznych oraz analizą wymagań i potrzeb użytkownika.
EN
Article contains overview of selected solutions in the area of authenticating elements of tactical ad-hoc networks. Description of the concepts, mechanisms and authentication protocols has been preceded by characteristics of tactical networks environment and analysis of user requirements and needs.
Rocznik
Tom
Strony
63--69
Opis fizyczny
Bibliogr. 27 poz., rys., tab.
Twórcy
autor
Bibliografia
  • [1] Kidston D., Li L., Tang H., Mason R: Mitigating Security in Tactical Networks, NATO IST-092 Symposium, September 2010
  • [2] Boucher L, Churavy M., Plesse T, Marquart D., Stassinopoulos G., Kyriazakos S., Papaoulakis N., Nikitopoulos D., Maseng T.: Awareness of Emerging Wireless Technologies: Ad-hoc and Persona! Area Networks Standards and Emerging Technologies, NATO IST-035 Symposium, April 2007
  • [3] Jacobs S.: Tactical Network Security, in proceedings of The IEEE Military Communications Conference, MILCOM November 1999
  • [4] Sarela M., Nikander R: Applying Host Identity Protocol to Tactical Networks, in proceedings of The IEEE Military Communications Conference, MILCOM November 2004
  • [5] Tang H., Salmanian M., Chang C.: Strong Authentication for Tactical Mobile Ad Hoc Networks, Defence R&D Canada - Ottawa TM 2007-146, July 2007
  • [6] Kulkami S., Gouda M. G., Arora A.: Secret Instantiation in ad-hoc networks, Computer Communications, vol. 29, 2006
  • [7] Zhu S., Xu S., Setia S., Jajodia S.: Establishing pairwise keys for secure communication in ad noc networks: a probabilistic approach, in proceedings of the 11th IEEE International Conference on Network Protocols, 2003
  • [8] PirzadaA, McDonald C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in 27th Australasian Computer Science Conference, 2004
  • [9] Balfanz D., Smetters K., Stewart R, Wong H. C.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, in proceedings of the Annual Network & Distributed System Security Symposium, NDSS 2002
  • [10] Zhou L., Haas Z. J.: Securing Ad Hoc Networks, IEEE Network Journal, vol. 13, no. 6, 1999
  • [11] Luo H., Zerfos R, Kong J., Lu S., Zhang L.: Self-securing Ad Hoc Wireless Networks, in proceedings of The 7th IEEE Symposium on Computers and Communications, 2002
  • [12] Joshi D., Namuduri K., Pendse R.: Secure, Redundant and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis, EURASIP Journal on Wireless Communications and Networking, 2005
  • [13] Deng H., Mukherjee A., Agrawal D. R: Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, in proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004
  • [14] Lynn B.:Authenticated identity-based encryption, Cryptology ePrint Archive, Report 2002/072, 2002
  • [15] Calhoun T. E., Newman R., Beyah R.: Authentication in 802.11 LANs using a Covert S/de Channel, in proceedings of the IEEE International Conference on Communications, ICC 2009
  • [16] Kidston D., Lj L., Tang H., Mason R: Mitigating Security in Tactical Networks, NATO IST-092 Symposium, September 2010
  • [17] Xiao Q.: A Biometric Authentication Approach for high security Ad-hoc Networks, IEEE Information Assurance Workshop, 2004
  • [18] Thamilarasu G., Sridhar R.: Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks, in proceedings of IEEE Military Communications Conference, MILCOM 2007
  • [19] Lamport L.: Password Authentication with Insecure Communication, Communication of the ACM, vol. 24, no. 11, 1981
  • [20] Weimerskirch A., Westhoff D.: Zero Common-KnowledgeAuthentication for Pervasive Networks, 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003
  • [21] Dahill B., Levine B., Royer E., Shields C.: A Secure Routing Protocol for Ad Hoc Networks, University of Massachusetts Technical Report 01-37, August 2001
  • [22] Halvardsson M., Lindberg R: Reliable group communication in a military Mobile Ad hoc Network, Vaxjo University Report 04006, February 2004
  • [23] Perrigy A., Canettiz R., Songy D., Tygar J. D.: Efficient and Secure Source Authentication for Multicast, in proceedings of the Network and Distributed System Security Symposium, 2001
  • [24] Hu Y. C., Perrig A., Johnson D. B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, in proceedings of the ACM 8th Annual International Conference on Mobile Computing and Networking, MobiCom September 2002
  • [25] Hu Y.-C., Johnson D. B., Perrig A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Ad Hoc Networks, vol. 1, issue 1, July 2003
  • [26] Zhu S., Xu S., Setia S., Jajodia S.: LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks, IEEE 23rd International Conference on Distributed Computing Systems in conjunction with IEEE Workshop on Mobile and Wireless Networks, ICDCS / MWN May 2003
  • [27] Carter S., Yasinsac A.: Secure Position Aided Ad hoc Routing Protocol, in proceedings of the IASTED International Conference on Communications and Computer Networks, CCN November 2002
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0066-0013
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.