====== Towards Authentication/Authorization framework for MANET ====== ===== Introduction ===== Manet is becoming popular. There are many applications: tactical operation - for fast establishment of military communication during the deployment of forces in unknown and hostile terrain; * rescue missions - for communication in areas without adequate wireless coverage; * national security - for communication in times of national crisis, where the existing communication infrastructure is non-operational due to a natural disaster or a global war; * law enforcement - for fast establishment of communication infrastructure during law enforcement operations; * commercial use - for setting up communication in exhibitions, conferences, or sales presentations; * education - for operation of wall-free (virtual) classrooms; * and sensor networks - for communication between intelligent sensors (e.g., MEMS2) mounted on mobile platforms. ==== Challenges in MANET ==== * Routing * Medium access control * Multicasting * Security ===== MANET Security - State of the art ===== * security issues in MANET [5]: * Authentication (Group membership control...) * Key distribution * Encryption * Instrution detection * Security state of the art * Distributing CA (Zhou and Haas) * ID based system (Khalili, Katz, and Arbaugh) * Distributed Authentication (Luo et al.) * Thredhold cryptography * Novel quantum inspired mechanism. ===== References ===== [5] http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0CHwQFjAJ&url=http%3A%2F%2Fpet.ece.iisc.ernet.in%2Fsathish%2FSecurityinAdhocNetworks.pdf&ei=vaapT-TfGKXg4QT8-PWNCQ&usg=AFQjCNFsXhb6gSANvOnDtegJAEhGRExhPw&sig2=hAnYJJkmWWnLxPCGPLBAfA Mobile Ad Hoc Networks Security http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CFEQFjAB&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.138.7335%26rep%3Drep1%26type%3Dpdf&ei=IaqpT4TpCKzb4QSB0PXRCQ&usg=AFQjCNHqukOervRUzN7PyjlWTaTEs9Vl_A&sig2=F-O9p1BCL1mhRYvn4UzCTg