TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks

被引:0
作者
Lee, KH [1 ]
Hwang, CS [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136713, South Korea
来源
8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES | 2006年
关键词
ad hoc network; cluster; multilayer; security authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Initial study in mobile ad hoc routing has considered only problem of providing efficient routing protocols for finding paths in very dynamic networks, without considering security. Because of this, ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure based wireless networks. Our proposed protocol incorporates an end-to-end authentication protocol that relies on a mutual trust between nodes in other clusters. The scheme strategy takes advantage of the threshold certification based end-to-end authentication protocol in large ad hoc networks. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We present detailed security threats against multilayer cluster routing scheme. We successfully included the establishment of mutual end-to-end authentication, the prevention of node identity fabrication, and the secure distribution of provisional session keys using certification threshold key configuration by CCH (Control Cluster Head).
引用
收藏
页码:U491 / U496
页数:6
相关论文
共 7 条
  • [1] Distributed clustering for ad hoc networks
    Basagni, S
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN'99), PROCEEDINGS, 1999, : 310 - 315
  • [2] BECHLER M, 2004, P IEEE C COMP COMM I
  • [3] BEDINGROYER EM, 2003, WIRELESS NETWORKS AR, V9, P461
  • [4] CHAN ACF, 2004, P IEEE C COMPCOMM IN
  • [5] PIRZADA AA, 2M AUSTR COMP SCI C, V26
  • [6] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [7] Securing ad hoc networks
    Zhou, LD
    Zygmunt, JH
    [J]. IEEE NETWORK, 1999, 13 (06): : 24 - 30