About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 768489, 17 pages
http://dx.doi.org/10.1155/2013/768489
Research Article

Logic-Based Security Architecture for Systems Providing Multihop Communication

1Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan
2Computer Information Systems Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan

Received 16 June 2012; Revised 1 September 2012; Accepted 2 September 2012

Academic Editor: Leonardo B. Oliveira

Copyright © 2013 Iman Almomani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. ITU-T Recommendation X. 800, “Security architecture for Open Systems Interconnection for CCITT applications,” 1991.
  2. ITU-T Recommendation X. 805, “Security architecture for systems providing end-to-end communication,” 2003.
  3. A. D. Rubin and P. Honeyman, “Nonmonotonic cryptographic protocols,” in Proceedings Computer Security Foundations Workshop, pp. 100–116, June 1994.
  4. A. D. Rubin, “Extending NCP for protocols using public keys,” Mobile Networks and Applications, vol. 2, no. 3, pp. 227–241, 1997. View at Scopus
  5. Y. Xu and X. Xie, “Security analysis of routing protocol for MANET based on extended Rubin logic,” in Proceedings of the IEEE International Conference on Networking, Sensing and Control (ICNSC '08), pp. 1326–1331, Sanya, China, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Xu and X. Xie, “Extending rubin logic for electronic commerce protocols,” in Proceedings of the 2nd International Conference on Anti-counterfeiting, Security and Identification (ASID '08), pp. 448–451, Guiyang, China, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Xu and X. Xie, “Analysis of electronic commerce protocols based on extended rubin logic,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 2079–2084, Hunan, China, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Xu and X. Xie, “Analysis of authentication protocols based on rubin logic,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), Dalian, China, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. A. D. Rubin and P. Honeyman, “Long running jobs in an authenticated environment,” in Proceedings of the USENIX Security Conference IV, pp. 19–28, October 1993.
  10. R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers,” Communications of the ACM, vol. 21, no. 12, pp. 993–999, 1978. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “Authenticated routing for ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 598–610, 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Zhou and D. Gollmann, “Fair non-repudiation protocol,” in Proceedings of the 17th IEEE Symposium on Security and Privacy, pp. 55–61, Oakland, Calif, USA, May 1996. View at Scopus
  13. M. Satyanarayanan, “Integrating security in a large distributed system,” ACM Transactions on Computer Systems, vol. 7, no. 3, pp. 247–280, 1989. View at Publisher · View at Google Scholar · View at Scopus
  14. ITU-T Recommendation X. 509, “Information technology—Open System Interconnection—The Directory: public-key and attribute certificate framework,” 2008.
  15. J. Weiss, “Message digest, message authentication codes and digital signature,” in Jave Cryptography Extensions, pp. 101–118, 2004.
  16. J. Zhou and K. Y. Lam, “Securing digital signatures for non-repudiation,” Computer Communications, vol. 22, no. 8, pp. 710–716, 1999. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Shao, “Certificate-based fair exchange protocol of signatures from pairings,” Computer Networks, vol. 52, no. 16, pp. 3075–3084, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. C. H. Lima and P. J. Lee, “Korean certificate-based digital signature algorithm,” Computers and Electrical Engineering, vol. 25, no. 4, pp. 249–265, 1999. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Madria and J. Yin, “SeRWA: a secure routing protocol against wormhole attacks in sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1051–1063, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. S. Ozdemir and H. Çam, “Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 736–749, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. E. Stavrou and A. Pitsillides, “A survey on secure multipath routing protocols in WSNs,” Computer Networks, vol. 54, no. 13, pp. 2215–2238, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. O. Delgado-Mohatar, A. Fúster-Sabater, and J. M. Sierra, “A light-weight authentication scheme for wireless sensor networks,” Ad Hoc Networks, vol. 9, no. 5, pp. 727–735, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. I. Almomani and M. Saadeh, “Security model for tree-based routing in wireless sensor networks: structure and evaluation,” KSII Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1223–1247, 2012.
  24. K. Bicakci, I. E. Bagci, and B. Tavli, “Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures,” Information Sciences, vol. 188, pp. 44–63, 2012.
  25. X. Fan and G. Gong, “Accelerating signature-based broadcast authentication for wireless sensor networks,” Ad Hoc Networks, vol. 10, no. 4, pp. 723–736, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. ISO/IEC 9797-2, “Information technology-security techniques-Message Authentication Code (MACs)—Part 2: mechanisms using a dedicated hash function”.
  27. Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,” Wireless Networks, vol. 11, no. 1-2, pp. 21–38, 2005. View at Publisher · View at Google Scholar · View at Scopus
  28. R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “SecMR—a secure multipath routing protocol for ad hoc networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 87–99, 2007. View at Publisher · View at Google Scholar · View at Scopus
  29. J. Kim and G. Tsudik, “SRDP: secure route discovery for dynamic source routing in MANETs,” Ad Hoc Networks, vol. 7, no. 6, pp. 1097–1109, 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Gupte and M. Singhal, “Secure routing in mobile wireless ad hoc networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 151–174, 2003. View at Publisher · View at Google Scholar · View at Scopus
  31. K. K. Chauhan, A. K. S. Sanger, and V. S. Kushwah, “Securing on-demand source routing in MANETs,” in Proceedings of the 2nd International Conference on Computer and Network Technology (ICCNT '10), pp. 294–297, Bangkok, Thailand, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  32. S. G. Yoo, K. Y. Park, and J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 382810, 11 pages, 2012. View at Publisher · View at Google Scholar
  33. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, RSA Laboratories, vol. 5, no.2, 2002.