{"title":"一种自组织无线网络中的分层访问控制方案","authors":"C. Hernández-Goya, P. Caballero-Gil","doi":"10.1109/CCST.2005.1594870","DOIUrl":null,"url":null,"abstract":"The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A hierarchical access control scheme in ad-hoc wireless networks\",\"authors\":\"C. Hernández-Goya, P. Caballero-Gil\",\"doi\":\"10.1109/CCST.2005.1594870\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594870\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594870","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hierarchical access control scheme in ad-hoc wireless networks
The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.