An authentication protocol based on CBRP in ad hoc network

Keun Ho Lee, Heyi Sook Suh, Sang Bum Han, Sang-Geun Lee, Chong Sun Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Mobile and wireless network technology is growing at a rapidly changing in nowadays. Ad hoc networks are a new wireless networking paradigm for mobile host. Ad hoc networks do not rely on any fixed infrastructure such as base stations as mobile switching. Mobile hosts rely on each other to keep the network connected. Ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions. In this paper, we detail security threat against ad hoc routing protocols, specifically examining CBRP. Our authentication protocol based on CBRP(APBC) design an end-to-end message authentication scheme that relies on mutual trust between nodes in other clusters. The strategy of APBC is to take advantage of the multi-layer architecture that is designed for authentication protocol in CHs(Cluster Head) using MCH(Main CH). We have proposed an authentication protocol that uses certificates contain Diffie-Hellman key agreement and a multi-layer architecture at the physical layer so that the number of encryption needed, thereby reducing the computational overheads and successfully defeated all identified attacks. We also use new authentication protocol schemes, such as MCH using Challenge-Response identification protocol to build a highly secure and highly available authentication protocol service, which forms the core of our security framework.

Original languageEnglish
Title of host publication6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure
Pages407-412
Number of pages6
Volume1
Publication statusPublished - 2004 Jun 28
Event6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure - Phoenix Park, Korea, Republic of
Duration: 2004 Feb 92004 Feb 11

Other

Other6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure
CountryKorea, Republic of
CityPhoenix Park
Period04/2/904/2/11

Fingerprint

Ad hoc networks
Authentication
Network protocols
Wireless networks
Routing protocols
Base stations
Cryptography
Availability

Keywords

  • Ad Hoc Network
  • Authentication
  • CBRP
  • Cluster

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Lee, K. H., Suh, H. S., Han, S. B., Lee, S-G., & Hwang, C. S. (2004). An authentication protocol based on CBRP in ad hoc network. In 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure (Vol. 1, pp. 407-412)

An authentication protocol based on CBRP in ad hoc network. / Lee, Keun Ho; Suh, Heyi Sook; Han, Sang Bum; Lee, Sang-Geun; Hwang, Chong Sun.

6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. Vol. 1 2004. p. 407-412.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, KH, Suh, HS, Han, SB, Lee, S-G & Hwang, CS 2004, An authentication protocol based on CBRP in ad hoc network. in 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. vol. 1, pp. 407-412, 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure, Phoenix Park, Korea, Republic of, 04/2/9.
Lee KH, Suh HS, Han SB, Lee S-G, Hwang CS. An authentication protocol based on CBRP in ad hoc network. In 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. Vol. 1. 2004. p. 407-412
Lee, Keun Ho ; Suh, Heyi Sook ; Han, Sang Bum ; Lee, Sang-Geun ; Hwang, Chong Sun. / An authentication protocol based on CBRP in ad hoc network. 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure. Vol. 1 2004. pp. 407-412
@inproceedings{18d36fd8652441dd901fc4eaf95fed72,
title = "An authentication protocol based on CBRP in ad hoc network",
abstract = "Mobile and wireless network technology is growing at a rapidly changing in nowadays. Ad hoc networks are a new wireless networking paradigm for mobile host. Ad hoc networks do not rely on any fixed infrastructure such as base stations as mobile switching. Mobile hosts rely on each other to keep the network connected. Ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions. In this paper, we detail security threat against ad hoc routing protocols, specifically examining CBRP. Our authentication protocol based on CBRP(APBC) design an end-to-end message authentication scheme that relies on mutual trust between nodes in other clusters. The strategy of APBC is to take advantage of the multi-layer architecture that is designed for authentication protocol in CHs(Cluster Head) using MCH(Main CH). We have proposed an authentication protocol that uses certificates contain Diffie-Hellman key agreement and a multi-layer architecture at the physical layer so that the number of encryption needed, thereby reducing the computational overheads and successfully defeated all identified attacks. We also use new authentication protocol schemes, such as MCH using Challenge-Response identification protocol to build a highly secure and highly available authentication protocol service, which forms the core of our security framework.",
keywords = "Ad Hoc Network, Authentication, CBRP, Cluster",
author = "Lee, {Keun Ho} and Suh, {Heyi Sook} and Han, {Sang Bum} and Sang-Geun Lee and Hwang, {Chong Sun}",
year = "2004",
month = "6",
day = "28",
language = "English",
isbn = "8955191197",
volume = "1",
pages = "407--412",
booktitle = "6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure",

}

TY - GEN

T1 - An authentication protocol based on CBRP in ad hoc network

AU - Lee, Keun Ho

AU - Suh, Heyi Sook

AU - Han, Sang Bum

AU - Lee, Sang-Geun

AU - Hwang, Chong Sun

PY - 2004/6/28

Y1 - 2004/6/28

N2 - Mobile and wireless network technology is growing at a rapidly changing in nowadays. Ad hoc networks are a new wireless networking paradigm for mobile host. Ad hoc networks do not rely on any fixed infrastructure such as base stations as mobile switching. Mobile hosts rely on each other to keep the network connected. Ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions. In this paper, we detail security threat against ad hoc routing protocols, specifically examining CBRP. Our authentication protocol based on CBRP(APBC) design an end-to-end message authentication scheme that relies on mutual trust between nodes in other clusters. The strategy of APBC is to take advantage of the multi-layer architecture that is designed for authentication protocol in CHs(Cluster Head) using MCH(Main CH). We have proposed an authentication protocol that uses certificates contain Diffie-Hellman key agreement and a multi-layer architecture at the physical layer so that the number of encryption needed, thereby reducing the computational overheads and successfully defeated all identified attacks. We also use new authentication protocol schemes, such as MCH using Challenge-Response identification protocol to build a highly secure and highly available authentication protocol service, which forms the core of our security framework.

AB - Mobile and wireless network technology is growing at a rapidly changing in nowadays. Ad hoc networks are a new wireless networking paradigm for mobile host. Ad hoc networks do not rely on any fixed infrastructure such as base stations as mobile switching. Mobile hosts rely on each other to keep the network connected. Ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions. In this paper, we detail security threat against ad hoc routing protocols, specifically examining CBRP. Our authentication protocol based on CBRP(APBC) design an end-to-end message authentication scheme that relies on mutual trust between nodes in other clusters. The strategy of APBC is to take advantage of the multi-layer architecture that is designed for authentication protocol in CHs(Cluster Head) using MCH(Main CH). We have proposed an authentication protocol that uses certificates contain Diffie-Hellman key agreement and a multi-layer architecture at the physical layer so that the number of encryption needed, thereby reducing the computational overheads and successfully defeated all identified attacks. We also use new authentication protocol schemes, such as MCH using Challenge-Response identification protocol to build a highly secure and highly available authentication protocol service, which forms the core of our security framework.

KW - Ad Hoc Network

KW - Authentication

KW - CBRP

KW - Cluster

UR - http://www.scopus.com/inward/record.url?scp=2942670908&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=2942670908&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:2942670908

SN - 8955191197

SN - 9788955191196

VL - 1

SP - 407

EP - 412

BT - 6th International Conference on Advanced Communication Technology: Broadband Convergence Network Infrastructure

ER -