Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

被引:0
|
作者
Lee, KH
Han, SB
Suh, HS
Hwang, CS
Lee, S
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Minist Educ & Human Resources Dev Informat Techno, Seoul 110760, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.
引用
收藏
页码:321 / 329
页数:9
相关论文
共 50 条
  • [41] A virtual subnet scheme on clustering algorithms for mobile ad hoc networks
    Tai, Cheng-Feng
    Chiang, Tzu-Chiang
    Hou, Ting-Wei
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (03) : 2099 - 2109
  • [42] A stable clustering scheme for large scale mobile ad hoc networks
    Rasheed, TM
    Reynaud, L
    Al Agha, K
    2005 IEEE SARNOFF SYMPOSIUM ON ADVANCES IN WIRED AND WIRELESS COMMUNICATION, 2005, : 210 - 213
  • [43] A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks
    Wei, Lu
    Cui, Jie
    Zhong, Hong
    Bolodurina, Irina
    Gu, Chengjie
    He, Debiao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 4318 - 4333
  • [44] IDDIP: An ID Based Secure Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks
    Ghosh, Uttam
    Datta, Raja
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 61 - 65
  • [45] A Novel Verifiable Threshold Signature Scheme Based on Bilinear Pairing in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    PROCEEDING OF THE IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2012, : 361 - 366
  • [46] A secure hierarchical key management scheme in mobile ad hoc networks
    Shi, Rong-Hua
    Yuan, Qian
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (01): : 201 - 206
  • [47] Trust-based clustering for multicast key distribution scheme in ad hoc network (TBCMKDS)
    Palanisamy, V.
    Annadurai, P.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2011, 6 (1-2) : 46 - 64
  • [48] Distributed Hierarchical Key Management Scheme in Mobile Ad Hoc Networks
    Wang, Fei
    Yu, F. Richard
    Srinivasan, Anand
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1958 - 1962
  • [49] A secure group key management scheme in mobile ad hoc networks
    Li, J
    Cui, GH
    Fu, XQ
    Liu, ZY
    Su, L
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1156 - 1159
  • [50] An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks
    Daeinabi, Ameneh
    Rahbar, Akbar Ghaffarpour
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (02) : 517 - 529