Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Chong Sun Hwang, Sang-Geun Lee

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

Original languageEnglish
Pages (from-to)539-567
Number of pages29
JournalJournal of Information Science and Engineering
Volume23
Issue number2
Publication statusPublished - 2007 Mar 1

Fingerprint

Ad hoc networks
Authentication
certification
Network protocols
Mobile ad hoc networks
Routing protocols
Cryptography
Wireless networks
Fabrication
threat
infrastructure
communication

Keywords

  • Ad hoc network
  • Authentication
  • Cluster
  • Cluster head (CH)
  • Control cluster head (CCH)
  • Hierarchical
  • Security
  • Shadow key
  • Threshold

ASJC Scopus subject areas

  • Information Systems

Cite this

Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks. / Lee, Keun Ho; Han, Sang Bum; Suh, Heyi Sook; Hwang, Chong Sun; Lee, Sang-Geun.

In: Journal of Information Science and Engineering, Vol. 23, No. 2, 01.03.2007, p. 539-567.

Research output: Contribution to journalArticle

Lee, Keun Ho ; Han, Sang Bum ; Suh, Heyi Sook ; Hwang, Chong Sun ; Lee, Sang-Geun. / Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks. In: Journal of Information Science and Engineering. 2007 ; Vol. 23, No. 2. pp. 539-567.
@article{23cf327aa914439ba2089ce661a6250e,
title = "Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks",
abstract = "Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.",
keywords = "Ad hoc network, Authentication, Cluster, Cluster head (CH), Control cluster head (CCH), Hierarchical, Security, Shadow key, Threshold",
author = "Lee, {Keun Ho} and Han, {Sang Bum} and Suh, {Heyi Sook} and Hwang, {Chong Sun} and Sang-Geun Lee",
year = "2007",
month = "3",
day = "1",
language = "English",
volume = "23",
pages = "539--567",
journal = "Journal of Information Science and Engineering",
issn = "1016-2364",
publisher = "Institute of Information Science",
number = "2",

}

TY - JOUR

T1 - Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks

AU - Lee, Keun Ho

AU - Han, Sang Bum

AU - Suh, Heyi Sook

AU - Hwang, Chong Sun

AU - Lee, Sang-Geun

PY - 2007/3/1

Y1 - 2007/3/1

N2 - Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

AB - Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

KW - Ad hoc network

KW - Authentication

KW - Cluster

KW - Cluster head (CH)

KW - Control cluster head (CCH)

KW - Hierarchical

KW - Security

KW - Shadow key

KW - Threshold

UR - http://www.scopus.com/inward/record.url?scp=33947726211&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33947726211&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:33947726211

VL - 23

SP - 539

EP - 567

JO - Journal of Information Science and Engineering

JF - Journal of Information Science and Engineering

SN - 1016-2364

IS - 2

ER -