City Research Online

Authentication in a layered security approach for mobile ad hoc networks

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Abstract

An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered security approach is described and design criteria for creating secure ad hoc network using multiple authentication protocols are analysed. The performance of several such known protocols, which are based on challenge-response techniques, is presented through simulation results.

Publication Type: Article
Publisher Keywords: authentication, layered security approach, mobile ad hoc networks, authentication protocols, challenge-response techniques
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science > Software Reliability
SWORD Depositor:
[thumbnail of Authentication in a Layered Security Approach for.pdf]
Preview
PDF
Download (131kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login