An Authentication and Auto-configuration Scheme in Mobile Ad Hoc Networks

XU Zhong,DAI Guanzhong,YANG Deming,ZHANG Zhi
DOI: https://doi.org/10.3969/j.issn.1000-3428.2007.11.050
2007-01-01
Abstract:The existing routing protocols of ad hoc networks works on the fact that IP addresses of hosts are already configured before they join the network,and all nodes exchange data on the basis of trusting each other.So they are less secure and unavailable in a hostile environment.A new secure scheme of authentication and auto-configuration for mobile ad hoc networks is proposed.This scheme authenticates the participants using digital certification and automatically allocates the IP addresses resulted from a one-way hash function on the public key before nodes access to network,so it can prevent attacks such as address spoofing and those associated with authentication and auto-configuration in the ad hoc network.Security and efficiency of the scheme are discussed.
What problem does this paper attempt to address?