Browse > Article

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks  

Lee, Yong (Dept. of Electron. and Comm., ChungJu National University)
Lee, Goo-Yeon (Dept. of Computer Eng. Kangwon National University)
Publication Information
Abstract
Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.
Keywords
Authentication; Public Key; Randomized CA Group; Certificate; Mobile Ad Hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Lidong Zhou and Zygmunt J. Haas, 'Securing Adhoc network,' IEEE Network Magazine, Nov/Dec 1999. pp. 24 - 30   DOI   ScienceOn
2 Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang. 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,' IEEE 9th International Conference on Network Protocols (ICNP'01), 2001
3 Seung Yi and Robin Kravets, 'MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks,' 2nd Annual PKI Research Workshop Program (PKI 03}, Gaithersburg, Maryland, April, 2003
4 Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications(ICC) 2003, Anchorage, May 2003   DOI
5 Zygmunt J. Haas and Ben Liang,'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999   DOI   ScienceOn
6 N. Milanovic, M. Malek, A. Davidson and V. Milutinovic, 'Routing and Security in Mobile Ad Hoc Networks,' IEEE Computer Magazine, February 2004. pp. 69 - 73   DOI   ScienceOn
7 D. Balfanz, D.K Smetters, P. Stewart and H. C. Wong, 'Talking to Strangers : Authentication in Ad-Hoc Wireless Networks,' In Sysmposium on Network and Distributed System Security(NDSS '02), San Diego, USA, Feb. 2002
8 Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu and Lixia Zhang, 'Self -securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002   DOI
9 Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Mobility Helps Security in Ad Hoc Networks,' MobiHoc'03, Annapolis, USA. June 2003
10 Carlton R. Davis and Claude Crepeau, 'A Certificate Revocation Scheme for Wireless Ad hoc Networks,' 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 2003. Fairfax, VA, USA
11 Douceur, 'The Sibil Attack,' Proc. First International Workshop Peer-to-peer Systems(IPTPS), 2002
12 Seung Yi andRobin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU-ENG-2002-1717 University of Illinois at Urbana-Champaign, May 2002
13 Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Self-Orgainized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactions on Mobile Computings, Vol. 2, No. 1, January-March 2003. pp. 52 - 64   DOI   ScienceOn
14 Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, USA. January 2003
15 Sonali Bhargava, D. P. Agarawal, 'Scalable Security Schemes for Ad Hoc Networks,' IEEE Milcom 2002, Anaheim, USA, Oct. 2002
16 Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June, 1999   DOI
17 Y. Lee and Z. Haas, 'Authentication in Very Large Ad Hoc Networks using Randomized Groups,' 16th Annual IEEE PIMRC 2005, Berlin, Germany, Sep. 2005   DOI