Loading…
Self-organized authentication in mobile ad-hoc networks
This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including...
Saved in:
Published in: | Journal of communications and networks 2009, 11(5), , pp.509-517 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923 |
---|---|
cites | cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923 |
container_end_page | 517 |
container_issue | 5 |
container_start_page | 509 |
container_title | Journal of communications and networks |
container_volume | 11 |
creator | Caballero-Gil, Pino Hernandez-Goya, Candelaria |
description | This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios. |
doi_str_mv | 10.1109/JCN.2009.6388395 |
format | article |
fullrecord | <record><control><sourceid>nrf_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_22047505</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6388395</ieee_id><sourcerecordid>oai_kci_go_kr_ARTI_626433</sourcerecordid><originalsourceid>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</originalsourceid><addsrcrecordid>eNo9kM9LwzAUx4MoOKd3wUsvgpfWl6RJ2uMY_pgMBZ3nkKbJFtc1I6mI_vV2du70HrzP98vjg9AlhgxjKG-fps8ZASgzTouCluwIjXApeMpYjo_7nZAyJVTAKTqL8QMgxzTHIyTeTGNTH5aqdT-mTtRntzJt57TqnG8T1yYbX7nGJKpOV14nrem-fFjHc3RiVRPNxX6O0fv93WL6mM5fHmbTyTzVlBddqhSjjBmsLa0FA6OxEITzyhqqOCW5trwCXiqdcywqgFqQ2lgoBNTM2JLQMboZettg5Vo76ZX7m0sv10FOXhczyQnPKe1RGFAdfIzBWLkNbqPCt8Qgd45k70juHMm9oz5yPUS2KmrV2KBa7eIhRwjk_dc77mrgnDHmcP5v-QVthG6l</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Self-organized authentication in mobile ad-hoc networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</creator><creatorcontrib>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</creatorcontrib><description>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</description><identifier>ISSN: 1229-2370</identifier><identifier>EISSN: 1976-5541</identifier><identifier>DOI: 10.1109/JCN.2009.6388395</identifier><language>eng</language><publisher>Séoul: Editorial Department of Journal of Communications and Networks</publisher><subject>Access control ; Access methods and protocols, osi model ; Ad hoc networks ; Applied sciences ; Authentication ; Cryptography ; Equipments and installations ; Exact sciences and technology ; Information, signal and communications theory ; mobile ad-hoc networks (MANETs) ; Mobile computing ; Mobile radiocommunication systems ; Peer to peer computing ; Proposals ; Protocols ; Radiocommunications ; Signal and communications theory ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn ; 전자/정보통신공학</subject><ispartof>Journal of Communications and Networks, 2009, 11(5), , pp.509-517</ispartof><rights>2009 INIST-CNRS</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</citedby><cites>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6388395$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=22047505$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001389983$$DAccess content in National Research Foundation of Korea (NRF)$$Hfree_for_read</backlink></links><search><creatorcontrib>Caballero-Gil, Pino</creatorcontrib><creatorcontrib>Hernandez-Goya, Candelaria</creatorcontrib><title>Self-organized authentication in mobile ad-hoc networks</title><title>Journal of communications and networks</title><addtitle>JCN</addtitle><description>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</description><subject>Access control</subject><subject>Access methods and protocols, osi model</subject><subject>Ad hoc networks</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Cryptography</subject><subject>Equipments and installations</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>mobile ad-hoc networks (MANETs)</subject><subject>Mobile computing</subject><subject>Mobile radiocommunication systems</subject><subject>Peer to peer computing</subject><subject>Proposals</subject><subject>Protocols</subject><subject>Radiocommunications</subject><subject>Signal and communications theory</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><subject>전자/정보통신공학</subject><issn>1229-2370</issn><issn>1976-5541</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNo9kM9LwzAUx4MoOKd3wUsvgpfWl6RJ2uMY_pgMBZ3nkKbJFtc1I6mI_vV2du70HrzP98vjg9AlhgxjKG-fps8ZASgzTouCluwIjXApeMpYjo_7nZAyJVTAKTqL8QMgxzTHIyTeTGNTH5aqdT-mTtRntzJt57TqnG8T1yYbX7nGJKpOV14nrem-fFjHc3RiVRPNxX6O0fv93WL6mM5fHmbTyTzVlBddqhSjjBmsLa0FA6OxEITzyhqqOCW5trwCXiqdcywqgFqQ2lgoBNTM2JLQMboZettg5Vo76ZX7m0sv10FOXhczyQnPKe1RGFAdfIzBWLkNbqPCt8Qgd45k70juHMm9oz5yPUS2KmrV2KBa7eIhRwjk_dc77mrgnDHmcP5v-QVthG6l</recordid><startdate>20091001</startdate><enddate>20091001</enddate><creator>Caballero-Gil, Pino</creator><creator>Hernandez-Goya, Candelaria</creator><general>Editorial Department of Journal of Communications and Networks</general><general>Korean Institute of Communication Sciences</general><general>한국통신학회</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>ACYCR</scope></search><sort><creationdate>20091001</creationdate><title>Self-organized authentication in mobile ad-hoc networks</title><author>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access methods and protocols, osi model</topic><topic>Ad hoc networks</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Cryptography</topic><topic>Equipments and installations</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>mobile ad-hoc networks (MANETs)</topic><topic>Mobile computing</topic><topic>Mobile radiocommunication systems</topic><topic>Peer to peer computing</topic><topic>Proposals</topic><topic>Protocols</topic><topic>Radiocommunications</topic><topic>Signal and communications theory</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><topic>전자/정보통신공학</topic><toplevel>online_resources</toplevel><creatorcontrib>Caballero-Gil, Pino</creatorcontrib><creatorcontrib>Hernandez-Goya, Candelaria</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library Online</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Korean Citation Index</collection><jtitle>Journal of communications and networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Caballero-Gil, Pino</au><au>Hernandez-Goya, Candelaria</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Self-organized authentication in mobile ad-hoc networks</atitle><jtitle>Journal of communications and networks</jtitle><stitle>JCN</stitle><date>2009-10-01</date><risdate>2009</risdate><volume>11</volume><issue>5</issue><spage>509</spage><epage>517</epage><pages>509-517</pages><issn>1229-2370</issn><eissn>1976-5541</eissn><abstract>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</abstract><cop>Séoul</cop><pub>Editorial Department of Journal of Communications and Networks</pub><doi>10.1109/JCN.2009.6388395</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1229-2370 |
ispartof | Journal of Communications and Networks, 2009, 11(5), , pp.509-517 |
issn | 1229-2370 1976-5541 |
language | eng |
recordid | cdi_pascalfrancis_primary_22047505 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Access control Access methods and protocols, osi model Ad hoc networks Applied sciences Authentication Cryptography Equipments and installations Exact sciences and technology Information, signal and communications theory mobile ad-hoc networks (MANETs) Mobile computing Mobile radiocommunication systems Peer to peer computing Proposals Protocols Radiocommunications Signal and communications theory Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn 전자/정보통신공학 |
title | Self-organized authentication in mobile ad-hoc networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A07%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-nrf_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Self-organized%20authentication%20in%20mobile%20ad-hoc%20networks&rft.jtitle=Journal%20of%20communications%20and%20networks&rft.au=Caballero-Gil,%20Pino&rft.date=2009-10-01&rft.volume=11&rft.issue=5&rft.spage=509&rft.epage=517&rft.pages=509-517&rft.issn=1229-2370&rft.eissn=1976-5541&rft_id=info:doi/10.1109/JCN.2009.6388395&rft_dat=%3Cnrf_pasca%3Eoai_kci_go_kr_ARTI_626433%3C/nrf_pasca%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6388395&rfr_iscdi=true |