Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

被引:0
|
作者
Lee, KH
Han, SB
Suh, HS
Hwang, CS
Lee, S
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Minist Educ & Human Resources Dev Informat Techno, Seoul 110760, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.
引用
收藏
页码:321 / 329
页数:9
相关论文
共 50 条
  • [1] An Authenticated Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks
    Ghosh, Uttam
    Datta, Raja
    [J]. WOCN: 2009 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2009, : 418 - 423
  • [2] TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks
    Lee, KH
    Hwang, CS
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U491 - U496
  • [3] Alliance-based clustering scheme for group key management in mobile ad hoc networks
    Seba, H.
    Lagraa, S.
    Kheddouci, H.
    [J]. JOURNAL OF SUPERCOMPUTING, 2012, 61 (03): : 481 - 501
  • [4] Alliance-based clustering scheme for group key management in mobile ad hoc networks
    H. Seba
    S. Lagraa
    H. Kheddouci
    [J]. The Journal of Supercomputing, 2012, 61 : 481 - 501
  • [5] A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks
    El-Sayed, Avman
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 208 - 219
  • [6] A multi-layer group mobility model for mobile ad hoc networks
    Hu, Ming
    Lan, Mingjiao
    Wang, Xingquan
    Zhou, Jie
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 397 - 400
  • [7] An authenticated key agreement protocol for mobile ad hoc networks
    Zou, Xukai
    Thukral, Amandeep
    Ramamurthy, Byrav
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 509 - +
  • [8] Authenticated Symmetric Key Distribution For Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    [J]. 2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 847 - 852
  • [9] A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS
    van der Merwe, J.
    Dawoud, D. S.
    McDonald, S.
    [J]. SAIEE AFRICA RESEARCH JOURNAL, 2006, 97 (01): : 82 - 92
  • [10] An authenticated clustering-based group key agreement for large ad hoc networks
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China
    不详
    [J]. Adv. Inf. Sci. Serv. Sci., 2012, 7 (281-291):