Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

被引:0
|
作者
Lee, KH
Han, SB
Suh, HS
Hwang, CS
Lee, S
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Minist Educ & Human Resources Dev Informat Techno, Seoul 110760, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.
引用
收藏
页码:321 / 329
页数:9
相关论文
共 50 条
  • [31] A Verifiable Dynamic Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS (ICAL), 2012, : 315 - 320
  • [32] A Key Management Scheme Based on Double matrix CPK for Mobile Ad Hoc Networks
    Li, Hongxin
    Su, Jinhai
    Zhang, Chuanfu
    Shao, Chunyu
    [J]. ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 543 - 548
  • [33] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
    Wang, Fei
    Tang, Helen
    Yu, F. Richard
    Mason, Peter C.
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
  • [34] Parallel key management scheme for mobile ad hoc network based on traffic mining
    Lakshmi, R. Pushpa
    Kumar, A. Vincent Antony
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 14 - 23
  • [35] A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load
    Nguyen, HN
    Morino, H
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 905 - 915
  • [36] Multi-layer multicast key management with threshold cryptography
    Dexter, S
    Belostotskiy, R
    Eskicioglu, AM
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 705 - 715
  • [37] A New Stable Clustering Scheme for Highly Mobile Ad Hoc Networks
    Ni, Minming
    Zhong, Zhangdui
    Wu, Hao
    Zhao, Dongmei
    [J]. 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [38] Efficient Scalable Clustering Scheme for Pseudolinear Mobile Ad hoc Network
    Amjad, Mahfida
    Zaman, Ambreen
    Sakib, Kazi
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [39] An adaptive multihop clustering scheme for highly mobile ad hoc networks
    Ohta, T
    Inoue, S
    Kakuda, Y
    [J]. ISADS 2003: SIXTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2003, : 293 - 300
  • [40] A virtual subnet scheme on clustering algorithms for mobile ad hoc networks
    Tai, Cheng-Feng
    Chiang, Tzu-Chiang
    Hou, Ting-Wei
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (03) : 2099 - 2109