Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Deepak Kumar, Vinod Kumar

Deepak Kumar and Vinod Kumar. A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks. International Journal of Computer Applications 148(4):8-15, August 2016. BibTeX

	author = {Deepak Kumar and Vinod Kumar},
	title = {A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {4},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {8-15},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2016909265},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


An increasing growth has been witnessed in the last few year with respect to development of wireless and mobile communication networks. In MANETs, nodes are able to communicate through the use of wireless mediums, constituting dynamic topologies. The certificate-based authentication has a positive edge in wired networks. It's a significantly arduous task to adapt a certificate based authentication protocols for mobile ad hoc networks due to absence of fixed infrastructure or centralized management. A traditional certificate-based authentication system depends on a fixed trusted Certificate Authority (CA). In this case Certificate Authority (CA) takes the responsibility for the establishment, distribution, renewing, and revocation of certificates. The consideration of the fixed centralized network is not practically possible in MANETs, because of issues such as regular link breakdown, node mobility, and inadequate wireless medium. The numbers of approaches have been introduced, which focus on the challenges to adapt certificate-based authentication in a distributed way in mobile ad hoc networks. In this paper, some issues related to performance analysis of exiting authentication schemes have been discussed.

So, there is a need to construct a common frame work to evaluate the performance of certificate based authentication protocols for MANETs. This framework is based on two pillars. One is to survey some of the existing authentication mechanisms for MANETs and identify the needs of a secure authentication mechanism for MANETs in the context of distributed authentication. Second is the derivation of metrics to evaluate the performance of certificate based authentication schemes is done.


  1. Internet X.509 Public Key Infrastructure Certificate and CRL Profile - RFC 2459.
  2. S. Capkun, L. Buttyan and J-P Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc
  3. Networks ", IEEE Transactions on Mobile Computing, Vol. 2, No. 1, Jan-Mar 2003, pp. 52-64Hongmei Deng, Anindo Mukherjee, and Dharma P. “Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks ", in the Proceedings of IEEE Information Technology: Coding and Computing, 2004. 
  4. T.Surya Prakash Reddy, T. Sunil Kumar Reddy. " Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network. Int. J. Advanced Networking and Applications Volume: 02 Issue: 01 Pages: 464-469 (2010)
  5. Edith C. H. Ngai and Michael R. Lyu. "Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks", 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW'04), Hachioji, Tokyo, Japan, 3/23-24, 2004.
  6. L. Zhou and Z. Haas. “Securing Ad Hoc Networks”, IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December 1999.
  7. Matei Ciobanu Morogan, Sead Muftic. “Certificate Management in Ad Hoc Networks”, 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), January 27 - 31, 2003, pp. 337.
  8. F. Stajano and R. J. Anderson. “The resurrecting duckling: Security issues for ad-hoc wireless networks” In 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, Cambridge, United Kingdom, 1999. Springer-Verlag, Berlin Germany.
  9. Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong: "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks", Symposium on Network and Distributed Systems Security (NDSS'02), Xerox Palo Alto Research Center, Palo Alto, USA, 2002.
  10. P. Zimmerman. The Official PGP Users guide, MIT Press, 1995, ISBN 0-262-74017-6.
  11. T. Camp, J. Boleng, and V. Davies. “A Survey of Mobility Models for Ad Hoc Network Research", in Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, 2002.
  12. J. Yoon, M. Liu, and B. Noble. "Random waypoint considered harmful," in Proc. of IEEE INFOCOM '03, vol. 2, March 2003, pp. 1312—1321.
  13. K. Fall and K. Varadhan, The NS Manual, The VINT Project, UC Berkeley, January 2002.
  14. A. Shamir, “Identity based Cryptosystems and Signatures Schemes,” Proceedings o f the Advances in Cryptology, 1984.
  15. A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612-613, November 1979.
  16. L. Zhou and Z. J. Hass,”Securing Ad Hoc Networks,” IEEE Networks Special Issue on Network Security, November/December, 1999.
  17. B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A Secure Routing Protocol for Ad Hoc Networks,” Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001.
  18. D. Bonh and M. Franklin, “Identity-Based Encryption from Weil Pairing,” Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, Vol. 2139, pp. 213-229, Springer Verlag, 2001.
  19. ANNE MARIE HEGLAND, ELI WINJUM, STIG F. MJØLSNES, CHUNMING RONG IEEE Communications Surveys & Tutorials • 3rd Quarter 2006


Authentication schemes, ad-hoc and sensor networks, mobility model, metrics evaluation.