Tytuł artykułu
Autorzy
Identyfikatory
Warianty tytułu
Survey on authentication solutions for tactical ad-hoc network nodes
Języki publikacji
Abstrakty
Dokonano przeglądu wybranych rozwiązań w zakresie uwierzytelniania elementów taktycznej sieci ad-hoc. Opis koncepcji, mechanizmów i protokołów uwierzytelniania poprzedzono charakterystyką środowiska sieci taktycznych oraz analizą wymagań i potrzeb użytkownika.
Article contains overview of selected solutions in the area of authenticating elements of tactical ad-hoc networks. Description of the concepts, mechanisms and authentication protocols has been preceded by characteristics of tactical networks environment and analysis of user requirements and needs.
Wydawca
Rocznik
Tom
Strony
63--69
Opis fizyczny
Bibliogr. 27 poz., rys., tab.
Twórcy
autor
- Instytut Telekomunikacji, Wydział Elektroniki Wojskowej Akademii Technicznej, krzysztof.parobczak@wat.edu.pl
Bibliografia
- [1] Kidston D., Li L., Tang H., Mason R: Mitigating Security in Tactical Networks, NATO IST-092 Symposium, September 2010
- [2] Boucher L, Churavy M., Plesse T, Marquart D., Stassinopoulos G., Kyriazakos S., Papaoulakis N., Nikitopoulos D., Maseng T.: Awareness of Emerging Wireless Technologies: Ad-hoc and Persona! Area Networks Standards and Emerging Technologies, NATO IST-035 Symposium, April 2007
- [3] Jacobs S.: Tactical Network Security, in proceedings of The IEEE Military Communications Conference, MILCOM November 1999
- [4] Sarela M., Nikander R: Applying Host Identity Protocol to Tactical Networks, in proceedings of The IEEE Military Communications Conference, MILCOM November 2004
- [5] Tang H., Salmanian M., Chang C.: Strong Authentication for Tactical Mobile Ad Hoc Networks, Defence R&D Canada - Ottawa TM 2007-146, July 2007
- [6] Kulkami S., Gouda M. G., Arora A.: Secret Instantiation in ad-hoc networks, Computer Communications, vol. 29, 2006
- [7] Zhu S., Xu S., Setia S., Jajodia S.: Establishing pairwise keys for secure communication in ad noc networks: a probabilistic approach, in proceedings of the 11th IEEE International Conference on Network Protocols, 2003
- [8] PirzadaA, McDonald C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in 27th Australasian Computer Science Conference, 2004
- [9] Balfanz D., Smetters K., Stewart R, Wong H. C.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, in proceedings of the Annual Network & Distributed System Security Symposium, NDSS 2002
- [10] Zhou L., Haas Z. J.: Securing Ad Hoc Networks, IEEE Network Journal, vol. 13, no. 6, 1999
- [11] Luo H., Zerfos R, Kong J., Lu S., Zhang L.: Self-securing Ad Hoc Wireless Networks, in proceedings of The 7th IEEE Symposium on Computers and Communications, 2002
- [12] Joshi D., Namuduri K., Pendse R.: Secure, Redundant and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis, EURASIP Journal on Wireless Communications and Networking, 2005
- [13] Deng H., Mukherjee A., Agrawal D. R: Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, in proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004
- [14] Lynn B.:Authenticated identity-based encryption, Cryptology ePrint Archive, Report 2002/072, 2002
- [15] Calhoun T. E., Newman R., Beyah R.: Authentication in 802.11 LANs using a Covert S/de Channel, in proceedings of the IEEE International Conference on Communications, ICC 2009
- [16] Kidston D., Lj L., Tang H., Mason R: Mitigating Security in Tactical Networks, NATO IST-092 Symposium, September 2010
- [17] Xiao Q.: A Biometric Authentication Approach for high security Ad-hoc Networks, IEEE Information Assurance Workshop, 2004
- [18] Thamilarasu G., Sridhar R.: Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks, in proceedings of IEEE Military Communications Conference, MILCOM 2007
- [19] Lamport L.: Password Authentication with Insecure Communication, Communication of the ACM, vol. 24, no. 11, 1981
- [20] Weimerskirch A., Westhoff D.: Zero Common-KnowledgeAuthentication for Pervasive Networks, 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003
- [21] Dahill B., Levine B., Royer E., Shields C.: A Secure Routing Protocol for Ad Hoc Networks, University of Massachusetts Technical Report 01-37, August 2001
- [22] Halvardsson M., Lindberg R: Reliable group communication in a military Mobile Ad hoc Network, Vaxjo University Report 04006, February 2004
- [23] Perrigy A., Canettiz R., Songy D., Tygar J. D.: Efficient and Secure Source Authentication for Multicast, in proceedings of the Network and Distributed System Security Symposium, 2001
- [24] Hu Y. C., Perrig A., Johnson D. B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, in proceedings of the ACM 8th Annual International Conference on Mobile Computing and Networking, MobiCom September 2002
- [25] Hu Y.-C., Johnson D. B., Perrig A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Ad Hoc Networks, vol. 1, issue 1, July 2003
- [26] Zhu S., Xu S., Setia S., Jajodia S.: LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks, IEEE 23rd International Conference on Distributed Computing Systems in conjunction with IEEE Workshop on Mobile and Wireless Networks, ICDCS / MWN May 2003
- [27] Carter S., Yasinsac A.: Secure Position Aided Ad hoc Routing Protocol, in proceedings of the IASTED International Conference on Communications and Computer Networks, CCN November 2002
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0066-0013