City Research Online

Authentication in a layered security approach for mobile ad hoc networks

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011


An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered security approach is described and design criteria for creating secure ad hoc network using multiple authentication protocols are analysed. The performance of several such known protocols, which are based on challenge-response techniques, is presented through simulation results.

Publication Type: Article
Publisher Keywords: authentication, layered security approach, mobile ad hoc networks, authentication protocols, challenge-response techniques
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science > Software Reliability
Download (131kB) | Preview



Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login