Abstract
Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.
Original language | English |
---|---|
Pages (from-to) | 539-567 |
Number of pages | 29 |
Journal | Journal of Information Science and Engineering |
Volume | 23 |
Issue number | 2 |
Publication status | Published - 2007 Mar 1 |
Fingerprint
Keywords
- Ad hoc network
- Authentication
- Cluster
- Cluster head (CH)
- Control cluster head (CCH)
- Hierarchical
- Security
- Shadow key
- Threshold
ASJC Scopus subject areas
- Information Systems
Cite this
Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks. / Lee, Keun Ho; Han, Sang Bum; Suh, Heyi Sook; Hwang, Chong Sun; Lee, Sang-Geun.
In: Journal of Information Science and Engineering, Vol. 23, No. 2, 01.03.2007, p. 539-567.Research output: Contribution to journal › Article
}
TY - JOUR
T1 - Authentication protocol using threshold certification in hierarchical-cluster-based Ad hoc networks
AU - Lee, Keun Ho
AU - Han, Sang Bum
AU - Suh, Heyi Sook
AU - Hwang, Chong Sun
AU - Lee, Sang-Geun
PY - 2007/3/1
Y1 - 2007/3/1
N2 - Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.
AB - Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.
KW - Ad hoc network
KW - Authentication
KW - Cluster
KW - Cluster head (CH)
KW - Control cluster head (CCH)
KW - Hierarchical
KW - Security
KW - Shadow key
KW - Threshold
UR - http://www.scopus.com/inward/record.url?scp=33947726211&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33947726211&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:33947726211
VL - 23
SP - 539
EP - 567
JO - Journal of Information Science and Engineering
JF - Journal of Information Science and Engineering
SN - 1016-2364
IS - 2
ER -