Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks

نویسندگان

  • Keun-Ho Lee
  • Sang-Bum Han
  • Heyi-Sook Suh
  • Chong-Sun Hwang
  • SangKeun Lee
چکیده

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Based on Multilayer Clustering in Ad Hoc Networks

In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called “authentication based on multilayer clustering for ad hoc n...

متن کامل

Security and Reputation Schemes in Ad-hoc Networks Routing

Ad hoc networks have vital problem concerning their security aspects. These must be solved in order to realize complete Ad hoc applications. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography, certification authority, repu...

متن کامل

Authentication Schemes for Open Distributed Network: A Classification

An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized .Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a Distributed Netwo...

متن کامل

Public-Key Management System using Hamming Distance for Mobile Ad Hoc Network

Mobile ad-hoc networks have various implementation constraints such as infrastructure-free, non-trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability, and so on, have been arisen in the mobile ad-hoc networks...

متن کامل

Broadcasting Message Authentication Protocol for Vehicular Ad Hoc Networks Using Cluster Technique

It is well recognized that security plays a vital for the trustworthy operation of vehicular ad hoc networks (VANETs). One of the critical sanctuary issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from other vehicles. Vehicular ad hoc networks (VANETs) adopt the Public Key infrastructure (PKI) and Certificate Revocation Lists (CRLs) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2007