Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Chong Sun Hwang, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages321-329
Number of pages9
Volume3842 LNCS
Publication statusPublished - 2006 Jul 6
EventAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE - Harbin, China
Duration: 2006 Jan 162006 Jan 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3842 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE
CountryChina
CityHarbin
Period06/1/1606/1/18

    Fingerprint

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Lee, K. H., Han, S. B., Suh, H. S., Hwang, C. S., & Lee, S-G. (2006). Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3842 LNCS, pp. 321-329). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3842 LNCS).