Loading…

Self-organized authentication in mobile ad-hoc networks

This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including...

Full description

Saved in:
Bibliographic Details
Published in:Journal of communications and networks 2009, 11(5), , pp.509-517
Main Authors: Caballero-Gil, Pino, Hernandez-Goya, Candelaria
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923
cites cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923
container_end_page 517
container_issue 5
container_start_page 509
container_title Journal of communications and networks
container_volume 11
creator Caballero-Gil, Pino
Hernandez-Goya, Candelaria
description This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.
doi_str_mv 10.1109/JCN.2009.6388395
format article
fullrecord <record><control><sourceid>nrf_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_22047505</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6388395</ieee_id><sourcerecordid>oai_kci_go_kr_ARTI_626433</sourcerecordid><originalsourceid>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</originalsourceid><addsrcrecordid>eNo9kM9LwzAUx4MoOKd3wUsvgpfWl6RJ2uMY_pgMBZ3nkKbJFtc1I6mI_vV2du70HrzP98vjg9AlhgxjKG-fps8ZASgzTouCluwIjXApeMpYjo_7nZAyJVTAKTqL8QMgxzTHIyTeTGNTH5aqdT-mTtRntzJt57TqnG8T1yYbX7nGJKpOV14nrem-fFjHc3RiVRPNxX6O0fv93WL6mM5fHmbTyTzVlBddqhSjjBmsLa0FA6OxEITzyhqqOCW5trwCXiqdcywqgFqQ2lgoBNTM2JLQMboZettg5Vo76ZX7m0sv10FOXhczyQnPKe1RGFAdfIzBWLkNbqPCt8Qgd45k70juHMm9oz5yPUS2KmrV2KBa7eIhRwjk_dc77mrgnDHmcP5v-QVthG6l</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Self-organized authentication in mobile ad-hoc networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</creator><creatorcontrib>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</creatorcontrib><description>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</description><identifier>ISSN: 1229-2370</identifier><identifier>EISSN: 1976-5541</identifier><identifier>DOI: 10.1109/JCN.2009.6388395</identifier><language>eng</language><publisher>Séoul: Editorial Department of Journal of Communications and Networks</publisher><subject>Access control ; Access methods and protocols, osi model ; Ad hoc networks ; Applied sciences ; Authentication ; Cryptography ; Equipments and installations ; Exact sciences and technology ; Information, signal and communications theory ; mobile ad-hoc networks (MANETs) ; Mobile computing ; Mobile radiocommunication systems ; Peer to peer computing ; Proposals ; Protocols ; Radiocommunications ; Signal and communications theory ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn ; 전자/정보통신공학</subject><ispartof>Journal of Communications and Networks, 2009, 11(5), , pp.509-517</ispartof><rights>2009 INIST-CNRS</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</citedby><cites>FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6388395$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=22047505$$DView record in Pascal Francis$$Hfree_for_read</backlink><backlink>$$Uhttps://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001389983$$DAccess content in National Research Foundation of Korea (NRF)$$Hfree_for_read</backlink></links><search><creatorcontrib>Caballero-Gil, Pino</creatorcontrib><creatorcontrib>Hernandez-Goya, Candelaria</creatorcontrib><title>Self-organized authentication in mobile ad-hoc networks</title><title>Journal of communications and networks</title><addtitle>JCN</addtitle><description>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</description><subject>Access control</subject><subject>Access methods and protocols, osi model</subject><subject>Ad hoc networks</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Cryptography</subject><subject>Equipments and installations</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>mobile ad-hoc networks (MANETs)</subject><subject>Mobile computing</subject><subject>Mobile radiocommunication systems</subject><subject>Peer to peer computing</subject><subject>Proposals</subject><subject>Protocols</subject><subject>Radiocommunications</subject><subject>Signal and communications theory</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><subject>전자/정보통신공학</subject><issn>1229-2370</issn><issn>1976-5541</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNo9kM9LwzAUx4MoOKd3wUsvgpfWl6RJ2uMY_pgMBZ3nkKbJFtc1I6mI_vV2du70HrzP98vjg9AlhgxjKG-fps8ZASgzTouCluwIjXApeMpYjo_7nZAyJVTAKTqL8QMgxzTHIyTeTGNTH5aqdT-mTtRntzJt57TqnG8T1yYbX7nGJKpOV14nrem-fFjHc3RiVRPNxX6O0fv93WL6mM5fHmbTyTzVlBddqhSjjBmsLa0FA6OxEITzyhqqOCW5trwCXiqdcywqgFqQ2lgoBNTM2JLQMboZettg5Vo76ZX7m0sv10FOXhczyQnPKe1RGFAdfIzBWLkNbqPCt8Qgd45k70juHMm9oz5yPUS2KmrV2KBa7eIhRwjk_dc77mrgnDHmcP5v-QVthG6l</recordid><startdate>20091001</startdate><enddate>20091001</enddate><creator>Caballero-Gil, Pino</creator><creator>Hernandez-Goya, Candelaria</creator><general>Editorial Department of Journal of Communications and Networks</general><general>Korean Institute of Communication Sciences</general><general>한국통신학회</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>ACYCR</scope></search><sort><creationdate>20091001</creationdate><title>Self-organized authentication in mobile ad-hoc networks</title><author>Caballero-Gil, Pino ; Hernandez-Goya, Candelaria</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access methods and protocols, osi model</topic><topic>Ad hoc networks</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Cryptography</topic><topic>Equipments and installations</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>mobile ad-hoc networks (MANETs)</topic><topic>Mobile computing</topic><topic>Mobile radiocommunication systems</topic><topic>Peer to peer computing</topic><topic>Proposals</topic><topic>Protocols</topic><topic>Radiocommunications</topic><topic>Signal and communications theory</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><topic>전자/정보통신공학</topic><toplevel>online_resources</toplevel><creatorcontrib>Caballero-Gil, Pino</creatorcontrib><creatorcontrib>Hernandez-Goya, Candelaria</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library Online</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Korean Citation Index</collection><jtitle>Journal of communications and networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Caballero-Gil, Pino</au><au>Hernandez-Goya, Candelaria</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Self-organized authentication in mobile ad-hoc networks</atitle><jtitle>Journal of communications and networks</jtitle><stitle>JCN</stitle><date>2009-10-01</date><risdate>2009</risdate><volume>11</volume><issue>5</issue><spage>509</spage><epage>517</epage><pages>509-517</pages><issn>1229-2370</issn><eissn>1976-5541</eissn><abstract>This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.</abstract><cop>Séoul</cop><pub>Editorial Department of Journal of Communications and Networks</pub><doi>10.1109/JCN.2009.6388395</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1229-2370
ispartof Journal of Communications and Networks, 2009, 11(5), , pp.509-517
issn 1229-2370
1976-5541
language eng
recordid cdi_pascalfrancis_primary_22047505
source IEEE Electronic Library (IEL) Journals
subjects Access control
Access methods and protocols, osi model
Ad hoc networks
Applied sciences
Authentication
Cryptography
Equipments and installations
Exact sciences and technology
Information, signal and communications theory
mobile ad-hoc networks (MANETs)
Mobile computing
Mobile radiocommunication systems
Peer to peer computing
Proposals
Protocols
Radiocommunications
Signal and communications theory
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
전자/정보통신공학
title Self-organized authentication in mobile ad-hoc networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A07%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-nrf_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Self-organized%20authentication%20in%20mobile%20ad-hoc%20networks&rft.jtitle=Journal%20of%20communications%20and%20networks&rft.au=Caballero-Gil,%20Pino&rft.date=2009-10-01&rft.volume=11&rft.issue=5&rft.spage=509&rft.epage=517&rft.pages=509-517&rft.issn=1229-2370&rft.eissn=1976-5541&rft_id=info:doi/10.1109/JCN.2009.6388395&rft_dat=%3Cnrf_pasca%3Eoai_kci_go_kr_ARTI_626433%3C/nrf_pasca%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c368t-aa5355e1cf3d750ec177266bfe3a6324cf6b069ac4617b00d72def0870d5ef923%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6388395&rfr_iscdi=true