Table of Contents
Towards Authentication/Authorization framework for MANET
Introduction
Manet is becoming popular. There are many applications: tactical operation - for fast establishment of military communication during the deployment of forces in unknown and hostile terrain;
- rescue missions - for communication in areas without adequate wireless coverage;
- national security - for communication in times of national crisis, where the existing communication infrastructure is non-operational due to a natural disaster or a global war;
- law enforcement - for fast establishment of communication infrastructure during law enforcement operations;
- commercial use - for setting up communication in exhibitions, conferences, or sales presentations;
- education - for operation of wall-free (virtual) classrooms;
- and sensor networks - for communication between intelligent sensors (e.g., MEMS2) mounted on mobile platforms.
Challenges in MANET
- Routing
- Medium access control
- Multicasting
- Security
MANET Security - State of the art
- security issues in MANET [5]:
- Authentication (Group membership control…)
- Key distribution
- Encryption
- Instrution detection
- Security state of the art
- Distributing CA (Zhou and Haas)
- ID based system (Khalili, Katz, and Arbaugh)
- Distributed Authentication (Luo et al.)
- Thredhold cryptography
- Novel quantum inspired mechanism.
References
Mobile Ad Hoc Networks Security http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CFEQFjAB&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.138.7335%26rep%3Drep1%26type%3Dpdf&ei=IaqpT4TpCKzb4QSB0PXRCQ&usg=AFQjCNHqukOervRUzN7PyjlWTaTEs9Vl_A&sig2=F-O9p1BCL1mhRYvn4UzCTg