Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

被引:0
|
作者
Lee, KH
Han, SB
Suh, HS
Hwang, CS
Lee, S
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Minist Educ & Human Resources Dev Informat Techno, Seoul 110760, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.
引用
收藏
页码:321 / 329
页数:9
相关论文
共 50 条
  • [21] Doppler shift based stable clustering scheme for mobile ad hoc networks
    Ni M.
    Zhong Z.
    Chen R.
    Zhao D.
    High Technology Letters, 2011, 17 (04) : 414 - 420
  • [22] Anomaly Detection in Wireless Mobile Ad hoc Networks with Multi-Layer Observation Sequences
    Wang, Tao
    Yu, ShunZheng
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 542 - 547
  • [23] Authenticated dynamic group key agreement for autoconfigurable Mobile Ad Hoc Networks
    Teo, Joseph Chee Ming
    Tan, Chik How
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (09) : 2480 - 2492
  • [24] An Energy Efficient Clustering Scheme for Mobile Ad Hoc Networks
    Ni, Minming
    Zhong, Zhangdui
    Wu, Hao
    Zhao, Dongmei
    2010 IEEE 71ST VEHICULAR TECHNOLOGY CONFERENCE, 2010,
  • [25] Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
    Yao, Yu
    Zhe, Li
    Jun, Liu
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 518 - 521
  • [26] A Novel Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 73 - 77
  • [27] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Deng, Lunzhi
    Shao, Jianxin
    Hu, Zhenyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2236 - 2247
  • [28] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Lunzhi Deng
    Jianxin Shao
    Zhenyu Hu
    Peer-to-Peer Networking and Applications, 2021, 14 : 2236 - 2247
  • [29] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [30] A secure dynamic IP configuration scheme for mobile ad hoc networks
    Ghosh, Uttam
    Datta, Raja
    AD HOC NETWORKS, 2011, 9 (07) : 1327 - 1342