Telecom Reporting Solution
Ad-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. The authors' work focuses on a light and distributed AAA infrastructure that supports authentication and authorization. They make use of a distributed protocol based on the threshold cryptography theory, and the ISO 9798-3 authentication protocol standard. Access to the network is also controlled by an access token generated by the AAA service and referring to some Cryptographically Generated Addresses.