Files in this item



application/pdfQuality of Authentication in Ad Hoc Networks.pdf (204kB)
(no description provided)PDF


Title:Quality of Authentication in Ad Hoc Networks
Author(s):Yi, Seung; Harris, Albert F., III; Kravets, Robin
Subject(s):ad hoc networks
Abstract:With the emergence of ad hoc networking technology came efforts to provide necessary security support for ad hoc networks. However, due to challenging characteristics of ad hoc environments, providing the same level of security as in wired networks is often very difficult if not impossible. A more viable way to approach this challenge is to maximize the utility of the achievable security instead of trying to achieve perfect security at a prohibitive cost. To this end, we propose a Situation-Aware Security paradigm. A situation-aware security service provides best-achievable service and the clients of the service constantly measure the level of the currently provided service. We apply this new paradigm to one of the most fundamental security services: authentication. Most proposed solutions measure their utility using only success ratio, which cannot fully measure the quality of the authentication service and often leads to a false sense of security. Therefore, we propose the missing part of the metric, the Quality of Authentication (QoA). QoA encapsulates the current situation that the authentication service operates in, which is expressed as the level of confidence an authenticating entity can put on the target entity. QoA combined with success ratio can provide a complete evaluation of an authentication service. We evaluate existing ad hoc key management frameworks with an extensive simulation study and combinatorial analysis of the framework designs to show the utility of QoA, including the discovery of previously hidden flaws of existing designs and a comprehensive comparison between several different approaches.
Issue Date:2007-08
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2007-2887
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-22

This item appears in the following Collection(s)

Item Statistics