Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks

모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석

  • Lee, Yong (Dept. of Electron. and Comm., ChungJu National University) ;
  • Lee, Goo-Yeon (Dept. of Computer Eng. Kangwon National University)
  • 이용 (충주대학교 전자통신공학) ;
  • 이구연 (강원대학교 컴퓨터학부)
  • Published : 2009.08.25

Abstract

Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

모바일 애드혹 네트워크는 유선 환경 기반구조의 도움없이 이동 노드에 의해 자치적으로 자가조직되는 구조이다. 이동 노드가 모바일 애드혹 네트워크를 구성하기 위해서는 라우팅 정보같이 네트워크의 관리에 필요한 정보들이 이동 노드들 간에 자치적으로 전달되는 특성으로 인해 네트워크의 보안이 중요한 주제이다. 특히 네트워크를 구성하는 이동 노드들이 서로를 신뢰 하는데 기반이 되는 인증 메커니즘은 필수적이다. 우리는 [1]에서 분산된 이동 노드들 간의 효율적인 인증을 위하여 랜덤 그룹을 이용한 인증 메커니즘을 제안하였다. 이 논문에서는 [1]에서 제안한 메커니즘의 성능을 분석하고 그 결과를 시뮬레이션 결과와 비교하였다 성능 분석 결과는 모바일 애드혹 네트워크를 구성하는 이동노드나 CA의 수에 상관없이 랜덤 CA 그룹의 크기가 10-12일 때, 최저의 비용으로 인증 메커니즘이 동작함을 보여주며, 추후 분산 인증 체계에서 공개키 방식을 적용하는 경우의 분석 모델로 활용될 수 있다.

Keywords

References

  1. Y. Lee and Z. Haas, 'Authentication in Very Large Ad Hoc Networks using Randomized Groups,' 16th Annual IEEE PIMRC 2005, Berlin, Germany, Sep. 2005 https://doi.org/10.1109/PIMRC.2005.1651788
  2. N. Milanovic, M. Malek, A. Davidson and V. Milutinovic, 'Routing and Security in Mobile Ad Hoc Networks,' IEEE Computer Magazine, February 2004. pp. 69 - 73 https://doi.org/10.1109/MC.2004.1266297
  3. Seung Yi andRobin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU-ENG-2002-1717 University of Illinois at Urbana-Champaign, May 2002
  4. Lidong Zhou and Zygmunt J. Haas, 'Securing Adhoc network,' IEEE Network Magazine, Nov/Dec 1999. pp. 24 - 30 https://doi.org/10.1109/65.806983
  5. Douceur, 'The Sibil Attack,' Proc. First International Workshop Peer-to-peer Systems(IPTPS), 2002
  6. Seung Yi and Robin Kravets, 'MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks,' 2nd Annual PKI Research Workshop Program (PKI 03}, Gaithersburg, Maryland, April, 2003
  7. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang. 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,' IEEE 9th International Conference on Network Protocols (ICNP'01), 2001
  8. Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu and Lixia Zhang, 'Self -securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002 https://doi.org/10.1109/ISCC.2002.1021731
  9. Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Self-Orgainized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactions on Mobile Computings, Vol. 2, No. 1, January-March 2003. pp. 52 - 64 https://doi.org/10.1109/TMC.2003.1195151
  10. Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Mobility Helps Security in Ad Hoc Networks,' MobiHoc'03, Annapolis, USA. June 2003
  11. Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, USA. January 2003
  12. Carlton R. Davis and Claude Crepeau, 'A Certificate Revocation Scheme for Wireless Ad hoc Networks,' 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 2003. Fairfax, VA, USA
  13. Zygmunt J. Haas and Ben Liang,'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999 https://doi.org/10.1109/90.769770
  14. Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June, 1999 https://doi.org/10.1109/ICC.1999.765546
  15. Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications(ICC) 2003, Anchorage, May 2003 https://doi.org/10.1109/ICC.2003.1204191
  16. D. Balfanz, D.K Smetters, P. Stewart and H. C. Wong, 'Talking to Strangers : Authentication in Ad-Hoc Wireless Networks,' In Sysmposium on Network and Distributed System Security(NDSS '02), San Diego, USA, Feb. 2002
  17. Sonali Bhargava, D. P. Agarawal, 'Scalable Security Schemes for Ad Hoc Networks,' IEEE Milcom 2002, Anaheim, USA, Oct. 2002