Two-tier authentication for cluster and individual sets in mobile ad hoc networks

被引:3
|
作者
Tsai, Yuh-Ren [1 ]
Wang, Shiuh-Jeng
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 300, Taiwan
关键词
mobile ad hoc networks (MANETs); authentication; routing security; secret sharing; hash function;
D O I
10.1016/j.comnet.2006.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) have been proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, some new security issues have arisen with the introduction of MANETs. Routing security, in particular, is an important and complicated issue. In this work, we propose a two-tier authentication scheme for cluster and individual sets, in MANETs. The first tier, based on a hash function and the MAC concept, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. The scenario of two-tier authentication can prevent internal and external attacks, including black holes, impersonation, routing table overflows and energy consummation attacks. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:883 / 900
页数:18
相关论文
共 50 条
  • [21] Two phases based cluster formation scheme for mobile ad hoc networks
    Wang, KC
    Cho, GW
    COMPUTATIONAL SCIENCE - ICCS 2003, PT I, PROCEEDINGS, 2003, 2657 : 194 - 203
  • [22] Two-Tier Mobile Data Aggregation in Wireless Sensor Networks
    Kim, Daehee
    Lee, Sangbin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1900 - 1903
  • [23] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Tameem Eissa
    Shukor Abd Razak
    Mohd Asri Ngadi
    Arabian Journal for Science and Engineering, 2012, 37 : 2179 - 2192
  • [24] Authentication employing neighbor tables in mobile ad hoc networks
    Azzabi, Dorsaf
    Tanaka, Kunihito
    Yamamoto, Ushio
    Onozato, Yoshikuni
    WINSYS 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2008, : 47 - 52
  • [25] Routing security and authentication mechanism for mobile ad hoc networks
    Tsai, YR
    Wang, SJ
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4716 - 4720
  • [26] Efficient authentication scheme for routing in mobile ad hoc networks
    Xu, SD
    Mu, Y
    Susilo, W
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 854 - 863
  • [27] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [28] Cluster maintenance in mobile ad-hoc networks
    Wang, L
    Olariu, S
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2005, 8 (2-3): : 111 - 118
  • [29] An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc Networks
    Yeh, Ching-Hung
    Hsieh, Meng-Yen
    Li, Kuan-Ching
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 388 - 393
  • [30] Authentication in a layered security approach for mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    COMPUTERS & SECURITY, 2007, 26 (05) : 373 - 380