Authentication Procedures for Ad-hoc Networks: Taxonomy and Investigation Subjects

Authors

  • M Bhuvaneswari Department of Computer Science, Marudupandiyar College, Bharathidasan University, India
  • L VijayaKalyani Department of Computer Science, Marudupandiyar College, Bharathidasan University, India

Keywords:

Authentication, net Security, procedure Taxonomy, ad hoc Networks, Credentials

Abstract

Ad hoc networks, such as device and moveable ad hoc networks, necessity overwhelmed a myriad of care examinations to realize their possible in composed civil and armed applications. Typically, ad hoc nets are prearranged in un-trusted environments. Consequently, verification is a precursor to any safe connections in these networks. Recently, frequent verification procedures consume remained future for ad hoc networks. To date, there is no communal outline to assess these protocols. In the direction of emerging such a framework, this newspaper proposes a general verification procedure and a new taxonomy that clarifies resemblances and changes amid verification procedures stated in the literature. The taxonomy is based upon the role of nodes in the verification function, founding of credentials, and type of credentials. We also inspire the essential for a verification group building and deliberate certain exposed investigation issues.

References

Xuguang Ren ; Coll. of Inf. Sci. & Technol., Jinan Univ., Guangzhou, China ; Xin-Wen Wu, “A novel dynamic user authentication scheme”, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 713 – 717

Jinwei Wang ; 28th Res. Inst, CETC, Nanjing ; Shiguo Lian ; Guangjie Liu, “On the analysis and design of secure multimedia authentication scheme”, Published in: Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on Date of Conference: 25-27 Aug. 2008 Page(s): 1298 – 1302

Shen-Ho Lin ; Dept. of Electr. Eng., Chang Gung Univ., Taiwan ; Jung-Hui Chiu ; Sung-Shiou Shen, “The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks” Published in: Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on Date of Conference: 4-6 Nov. 2010 Page(s): 429 – 434

Qing Li ; Wireless Inf. Network Lab. (WINLAB), Rutgers Univ., Piscataway, NJ, USA ; Trappe, W. “Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security” Published in: Information Forensics and Security, IEEE Transactions on (Volume:1 , Issue: 2 ) Date of Publication: June 2006 Page(s): 190 – 204

Bachan, P. ; Electron. & Commun. Engig. Dept., GL A Group of Instn., Mathura, India ; Singh, B. “Performance evaluation of authentication protocols for IEEE 802.11 standard” Published in: Computer and Communication Technology (ICCCT), 2010 International Conference on Date of Conference: 17-19 Sept. 2010 Page(s): 792 – 799

Javed, A. ; Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany ; Bletgen, D. ; Kohlar, F. ; Durmuth, M. more authors “Secure Fallback Authentication and the Trusted Friend Attack” Published in: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on Date of Conference: June 30 2014-July 3 2014 Page(s): 22 – 28

Dinesha, H.A. ; CORI, Bangalore, India ; Agrawal, V.K. “Multi-level authentication technique for accessing cloud services” Published in: Computing, Communication and Applications (ICCCA), 2012 International Conference on Date of Conference: 22-24 Feb. 2012 Page(s): 1 – 4

Fang Lan ; Dept. of Network Res., Inst. of Syst. Eng., Beijing, China ; Wang Chunlei ; Ma Guoqing, “A framework for network security situation awareness based on knowledge discovery” Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:1 ) Date of Conference: 16-18 April 2010 Page(s): V1-226 - V1-231

Wu Kehe ; Dept. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing, China ; Zhang Tong ; Li Wei ; Ma Gang, “Security Model Based on Network Business Security” Published in: Computer Technology and Development, 2009. ICCTD '09. International Conference on (Volume:1 ) Date of Conference: 13-15 Nov. 2009 Page(s): 577 – 580

Zhihu Wang ; Guangxi Econ. Manage. Cadre Coll., Nanning, China, “Design and realization of computer network security perception control system” Published in: ommunication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on Date of Conference: 27-29 May 2011 Page(s): 163 – 166

Rongrong Xi ; Inst. of Comput. Technol., Beijing, China ; Shuyuan Jin ; XiaoChun Yun ; YongZheng Zhang, “CNSSA: A Comprehensive Network Security Situation Awareness System” Published in: Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on Date of Conference: 16-18 Nov. 2011 Page(s): 482 – 487

Xiaoyan Li ; Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Qingxian Wang ; Lin Yang ; Xiangyang Luo, “The Research on Network Security Visualization Key Technology” Published in: Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on Date of Conference: 2-4 Nov. 2012 Page(s): 983 – 988

Bhandari, P. ; Doaba Coll., Jalandhar, India ; Gujral, M.S. “Ontology based approach for perception of network security state” Published in: Engineering and Computational Sciences (RAECS), 2014 Recent Advances in Date of Conference: 6-8 March 2014 Page(s): 1 – 6

Zhiyong Lu ; LEETC, Luoyang, China ; Yunyan Zhou, “The Evaluation Model for Network Security” Published in: Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on Date of Conference: 7-9 April 2014 Page(s): 690 – 694

Songmei Zhang ; Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China ; Shan Yao ; Xin'en Ye ; Chunhe Xia, “A Network Security Situation Analysis framework based on information fusion” Published in: Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International (Volume:1 ) Date of Conference: 20-22 Aug. 2011 Page(s): 326 – 332

Beydoun, K. ; Dept. of Comput. Sci., Lebanese Univ., Hadath, Lebanon ; Felea, V. “WSN hierarchical routing protocol taxonomy” Published in: Telecommunications (ICT), 2012 19th International Conference on Date of Conference: 23-25 April 2012 Page(s): 1 – 6

Kelly, D. ; Human Effectiveness Directorate, Air Force Res. Lab., Wright-Patterson AFB, OH, USA ; Raines, R. ; Baldwin, R. ; Grimaila, M. more authors “Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics” Published in: Communications Surveys & Tutorials, IEEE (Volume:14 , Issue: 2 ) Date of Publication: Second Quarter 2012 Page(s): 579 – 606

Syverson, P. ; Naval Res. Lab., Washington, DC, USA, “A taxonomy of replay attacks [cryptographic protocols]” Published in: Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings Date of Conference: 14-16 Jun 1994 Page(s): 187 – 191

Ramalho, M. ; Alcatel Corp. Res. Centre, Antwerp, Belgium, “Intra- and inter-domain multicast routing protocols: A survey and taxonomy” Published in: Communications Surveys & Tutorials, IEEE (Volume:3 , Issue: 1 ) Date of Publication: First Quarter 2000 Page(s): 2 – 25

Obraczka, K. ; Inf. Sci. Inst., Univ. of Southern California, Marina del Rey, CA, USA, “Multicast transport protocols: a survey and taxonomy” Published in: Communications Magazine, IEEE (Volume:36 , Issue: 1 ) Date of Publication: Jan 1998 Page(s): 94 – 102

Nan Guo ; Coll. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Tianhan Gao ; Bin Zhang, “BPVrfy: Hybrid Cryptographic Scheme Based -- Federate Identity Attributes Verification Model for Business Processes” Published in: Availability, Reliability and Security (ARES), 2012 Seventh International Conference on Date of Conference: 20-24 Aug. 2012 Page(s): 417 – 424

Chun-Hong Jiang ; Dept. of Electron. Eng., Tsinghua Univ., Beijing, China ; Guang-da Su, “Information fusion in face and fingerprint identity verification system” Published in: Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on (Volume:6 ) Date of Conference: 26-29 Aug. 2004 Page(s): 3529 - 3535 vol.6

Slomovic, A. “Privacy Issues in Identity Verification” Published in: Security & Privacy, IEEE (Volume:12 , Issue: 3 ) Date of Publication: May-June 2014 Page(s): 71 – 73

Junhua Chen ; Sch. of Comput. Sci. & Technol., Beijing Inst. of Technol., Beijing ; Wu Peng “A Zero-Knowledge Identity Verification Protocol Using Blind Watermark” Published in: Computer Engineering and Technology, 2009. ICCET '09. International Conference on (Volume:2 ) Date of Conference: 22-24 Jan. 2009 Page(s): 496 – 498

Songwei Wang ; R&D Inst. of Integrated Meas. & Control, Dalian Polytech. Univ., Dalian, China ; Changwu Li ; Jian Liu ; Zhisen Wang, “Design of identity verification unit and management system” Published in: Communication Technology and Application (ICCTA 2011), IET International Conference on Date of Conference: 14-16 Oct. 2011 Page(s): 792 – 795

Shen, T.W. ; Dept. of Biomed. Eng., Wisconsin Univ., Madison, WI, USA ; Tompkins, W.J. ; Hu, Y.H. “One-lead ECG for identity verification” Published in: Engineering in Medicine and Biology, 2002. 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society EMBS/BMES Conference, 2002. Proceedings of the Second Joint (Volume:1 ) Date of Conference: 2002 Page(s): 62 - 63 vol.1

Do Hoon Kim ; Korea Univ., Seoul ; Taek Lee ; Jung, S.-O.D. ; Hoh Peter In more authors, “Cyber Threat Trend Analysis Model Using HMM” Published in: Information Assurance and Security, 2007. IAS 2007. Third International Symposium on Date of Conference: 29-31 Aug. 2007 Page(s): 177 – 182

Zhou Yanbing ; North China Electr. Power Univ., Beijing, China ; Liu Yibing ; Xin Weidong ; Wei Ruiyan, “Trend analysis for gear pitting fault based on the non-Gaussian characteristic” Published in: Intelligent Control and Information Processing (ICICIP), 2011 2nd International Conference on (Volume:2 ) Date of Conference: 25-28 July 2011 Page(s): 1144 – 1148

Trevisan, B. ; Textlinguistics/ Tech., Commun., RWTH Aachen Univ., Aachen, Germany ; Erasme, D. ; Jakobs, E.-M. “Web comment-based trend analysis on deep geothermal energy” Published in: Professional Communication Conference (IPCC), 2013 IEEE International Date of Conference: 15-17 July 2013 Page(s): 1 – 8

Jianguo Cui ; Sch. of Autom., Shenyang Aerosp. Univ., Shenyang, China ; Jianqiang Shi ; Shiliang Dong ; Liying Jiang more authors, “The condition trend analysis of aircraft key components based on D-S evidence theory” Published in: Control and Decision Conference (CCDC), 2012 24th Chinese Date of Conference: 23-25 May 2012 Page(s): 2264 - 2269

Downloads

Published

2014-09-30

How to Cite

[1]
M. Bhuvaneswari and L. VijayaKalyani, “Authentication Procedures for Ad-hoc Networks: Taxonomy and Investigation Subjects”, Int. J. Comp. Sci. Eng., vol. 2, no. 9, pp. 90–99, Sep. 2014.

Issue

Section

Research Article