skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Final report for the mobile node authentication LDRD project.

Abstract

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenariosmore » were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.« less

Authors:
;
Publication Date:
Research Org.:
Sandia National Laboratories
Sponsoring Org.:
USDOE
OSTI Identifier:
876240
Report Number(s):
SAND2005-5463
TRN: US200606%%50
DOE Contract Number:  
AC04-94AL85000
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; COMMUNICATIONS; PERFORMANCE; ROUTING; SIMULATORS; STATISTICS; MILITARY EQUIPMENT; VERIFICATION; SECRECY PROTECTION; DATA TRANSMISSION; Authentication.; Wireless communication systems.; Cryptography.

Citation Formats

Michalski, John T, and Lanzone, Andrew J. Final report for the mobile node authentication LDRD project.. United States: N. p., 2005. Web. doi:10.2172/876240.
Michalski, John T, & Lanzone, Andrew J. Final report for the mobile node authentication LDRD project.. United States. https://doi.org/10.2172/876240
Michalski, John T, and Lanzone, Andrew J. Thu . "Final report for the mobile node authentication LDRD project.". United States. https://doi.org/10.2172/876240. https://www.osti.gov/servlets/purl/876240.
@article{osti_876240,
title = {Final report for the mobile node authentication LDRD project.},
author = {Michalski, John T and Lanzone, Andrew J},
abstractNote = {In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.},
doi = {10.2172/876240},
url = {https://www.osti.gov/biblio/876240}, journal = {},
number = ,
volume = ,
place = {United States},
year = {2005},
month = {9}
}