A. Wierzbicki, A. Zwierko, and Z. Kotulski (Poland)
Software Security, Ad-hoc Networks, Peer-to-peer Sys tems, Authentication, Revocable Anonymity.
This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or need for revoca ble anonymity. At the same time, an ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article ana lyzes existing authentication methods based on the Public Key Infrastructure, and finds that they have several draw backs in ad-hoc networks. Therefore, a new authentica tion protocol, basing on established cryptographic primi tives (Merkle’s puzzles and zero-knowledge proofs) is pro posed. The protocol is studied for a model ad-hoc chat ap plication that provides private conversations.
Important Links:
Go Back