Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.6.59

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol  

Lim, Ji-Hyung (INHA University Graduate School of IT&T)
Kang, Jeon-Il (INHA University Graduate School of IT&T)
Koh, Jae-Young (Electronics and Telecommunications Research Institute)
Han, Kwang-Taek (Electronics and Telecommunications Research Institute)
Nyang, Dae-Hun (INHA University Graduate School of IT&T)
Abstract
Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.
Keywords
Ad hoc network security; Grid-Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens, 'An On-Demand Secure Routing Protocol Resilent to Byzantine Failures', In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 28 2002
2 Stephen Carter and Alec Yasinsac, 'Secure Position Aided Ad hoc Routing Protocol', Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002
3 Jean-Pierre Hubaux, Levente Buttyan, Srdjan Capkun, 'The Quest for Security in Mobile Ad Hoc Networks', Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking \& computing, 2001
4 The Network Simulator(ns-2), http://www.isi.edu/nsnam/ns/
5 Jinyang Li, 'A Scalable Location Service for Geographic Ad Hoc Routing', 6th ACM International Conference on Mobile computing and Networking (MobiCom'00), pp.120-130, Aug. 2000
6 The Grid Ad Hoc Networking Project, http://pdos.csail.mit.edu/grid/sim/
7 Jiejun Kong, 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks', IEEE 9th International Conference on Network Protocols (ICNP'01), pp.251-260, 2001
8 C-K Toh, 'Ad Hoc Mobile Wireless Networks Protocols and Systems', Prentice Hall, Jan. 2004
9 S. Yi, P. Naldurg, and R. Kravets, 'Security-Aware Ad hoc Routing for Wireless Networks', The Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001
10 Shamir A., 'How to Share a Secret', Communication of the ACM, pp. 612-613, Nov. 1979   DOI   ScienceOn
11 T.P. Pedersen, 'A threshold cryptosystem without a trusted party', Advances in Cryptology, Proceedings of the CRYPTO'91, pp. 522-526, 1991