Browse > Article
http://dx.doi.org/10.6109/JKIICE.2007.11.1.206

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node  

Lee, Dae-Young (조선대학교 자연과학대학 전산통계학과)
Song, Sang-Hoon (조선대학교 전산통계학과)
Bae, Sang-Hyun (조선대학교 전산통계학과)
Abstract
Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.
Keywords
MANET; Certificate Management MANET Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Luo, S. Lu, 'Ubiquitous and Robust Authentication Service for Ad Hoc Wireless Network, n Technical Report TR-2000, 30, Dept. of Computer Science, UCLA, 2000
2 A. Shamir, 'How to Share a Secret' Communication of the ACM, 22(11), pp.612-613, 1979   DOI   ScienceOn
3 J. Kong, P. Zerfos, H. Luo, S. Lu, L.Zhang, 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Network,' IEEE 9th International conference on Network Protocols(ICNP'01), pp.251-260, 2001
4 K. Sanzgiri, B. Dahill, B Levine, C Shields, E. Belding-Royer, 'A Secure Routing Protocol for Ad Hoc Network,'Proc. of ICNP02, pp.78-87, 2002
5 Y. Frankel, Y. G. Demedt, 'Parallel Reliable Threshold Multi-signature', Univ. of Wisconsin-Milwaukee. Technical Report TR-92-94-02. Apr. 1992
6 T. P Pedersen, 'A Threshold Crypto System without a Trusted Party,' In Advances in Cryptolgy Eurocypt 91, pp. 522-526, 1991
7 H.Luo, J.Kong, P. Zerfos, S. Lu, L.Zhang, 'Self-securing Ad Hoc Wireless Networks,' 7th IEEE Symposium on Computer and Communications, pp.1627 -1637, 2000
8 S. Basagni, K. Herrin, E. Rosti, and D. Bruschi, 'Secure Pebble-nets', Proc. of the ACM Symposium on MobiHoc, pp.156-163, 2001
9 L. Zhou, Z J. Haas, 'Securing Ad Hoc Network', IEEE Network, 13(6), pp.24-30, 1999