Browse > Article

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET  

Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.9, no.1, 2013 , pp. 87-93 More about this Journal
Abstract
MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.
Keywords
Authentication; Mobile Ad-hoc Network; Hierarchical Structure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Rokach and O. Maimon, "Top-down induction of decision trees classifier - a survey," IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 35, no. 4, Nov. 2005, pp. 476-487.   DOI   ScienceOn
2 정혜원, "MANET에서 규칙을 기반으로 한 계층형 침입탐지에 관한 연구," 디지털산업정보학회지, 제6권, 제4호, 2010, pp. 153-160.
3 T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts," G. Vigna, editor, Mobile Agents and Security, vol. 1419, LNCS, 1998, pp. 44-60.
4 서희석, 김상호, 이승재, "소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 121-129.
5 S. Yi, R. Kravets, "MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks," 2nd Annual PKI Research Workshop Program(PKI 03), 2003, pp. 65-79.
6 S. Garfinke, "PGP:Pretty Good Privacy," O'Reilly & Associates Inc., USA, 1995.
7 S. Capkun, L. Buttyan, J. Hubaux, "Self-Orgranized Public-Key Management form Mobile Ad Hoc Networks," IEEE Trans on Mobile Computing, Vol. 2, No. 1, 2003, pp. 52-64.   DOI   ScienceOn
8 S. Basagni, M. Conti, S. Giodano, I. Stojmenovic, "Mobile Ad Hoc Networking," IEEE press, Wiley-Interscience, 2004.
9 V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110. 501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.