Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Chong Sun Hwang, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages321-329
Number of pages9
Volume3842 LNCS
Publication statusPublished - 2006 Jul 6
EventAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE - Harbin, China
Duration: 2006 Jan 162006 Jan 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3842 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE
CountryChina
CityHarbin
Period06/1/1606/1/18

Fingerprint

Ad hoc networks
Authentication
Cluster Analysis
Multilayer
Clustering
Routing protocols
Ad Hoc Networks
Configuration
Network protocols
Routing Protocol
Threshold Cryptography
Cryptography
Authentication Protocol
Certificate
Attack
Vertex of a graph

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Lee, K. H., Han, S. B., Suh, H. S., Hwang, C. S., & Lee, S-G. (2006). Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3842 LNCS, pp. 321-329). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3842 LNCS).

Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. / Lee, Keun Ho; Han, Sang Bum; Suh, Heyi Sook; Hwang, Chong Sun; Lee, Sang-Geun.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3842 LNCS 2006. p. 321-329 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3842 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, KH, Han, SB, Suh, HS, Hwang, CS & Lee, S-G 2006, Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3842 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3842 LNCS, pp. 321-329, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, 06/1/16.
Lee KH, Han SB, Suh HS, Hwang CS, Lee S-G. Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3842 LNCS. 2006. p. 321-329. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lee, Keun Ho ; Han, Sang Bum ; Suh, Heyi Sook ; Hwang, Chong Sun ; Lee, Sang-Geun. / Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3842 LNCS 2006. pp. 321-329 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{16f6a48b6f0643728ec9f770c1aa1fb1,
title = "Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc",
abstract = "In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.",
author = "Lee, {Keun Ho} and Han, {Sang Bum} and Suh, {Heyi Sook} and Hwang, {Chong Sun} and Sang-Geun Lee",
year = "2006",
month = "7",
day = "6",
language = "English",
isbn = "3540311580",
volume = "3842 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "321--329",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

AU - Lee, Keun Ho

AU - Han, Sang Bum

AU - Suh, Heyi Sook

AU - Hwang, Chong Sun

AU - Lee, Sang-Geun

PY - 2006/7/6

Y1 - 2006/7/6

N2 - In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.

AB - In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.

UR - http://www.scopus.com/inward/record.url?scp=33745655404&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745655404&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745655404

SN - 3540311580

SN - 9783540311584

VL - 3842 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 321

EP - 329

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -