Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.5.47

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network  

Lee, Seok-Lae (Korea Information Security Agency)
Song, Joo-Seok (Yonsei University Computer Science)
Abstract
Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.
Keywords
Hamming Distance; Authentication; PKI; Certificate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Stajano and R. Anderson, 'The Resurrecting Duckling : Security Issues for Ad-hoc Wireless Networks', Proc. seventh Int'l workshop security protocols, 1999
2 H. Luo and S. Lu, 'Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks', Technical Report 200030, UCLA Computer Science Department, Oct. 2000
3 J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 'Providing robust and ubiquitous security support for MANET,' Proc. ninth Int'l conf. Network Protocols(ICNP), Nov. 2001
4 R. Hamming. Coding and Information Theory. Prentice-Hall, 1980
5 J.-P. Hubaux, L. Buttyan, and S. Capkun, 'The Quest for Security in Mobile Ad Hoc Networks,' Proc. ACM Symp. Mobile Ad Hoc Networking and in Computing(MobiHoc), 2001
6 K. Fokine, 'Key Management in Ad Hoc Networks', LiTH-ISY-EX-3322-2002, 2002
7 A. Weimerskirch and G. Thonet, 'A Distributed Light-Weight Authentication Model for Ad-hoc Networks', v. 2288 of LNCS, 2002
8 A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, 'proactive Secret Sharing, or: how to cope with perpetual leakage,' Advances in Cryptography - Crypto 95' Proceedings, LNCS Vol 963, 1995
9 H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, 'Self-securing Ad Hoc Wireless Networks', Seventh IEEE Symp. on Computers and Communications(ISCC '02), 2002
10 Y. Frankel, P. Gemmell, P.-D. Mac-Kenzie, and M. Yung, 'Optimal- Resilience Proactive Public-Key Cryptosystems', IEEE Symp. on Foundations of Computer Science, 1997
11 S. Capkun, L. Buttyan and J.-P. Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks', IEEE Trans. on mobile computing, vol. 2, No. 1, Jan./Mar. 2003
12 S. Corson and J. Macker, 'Mobile Ad hoc Networking(MANET): Routing Protocol Performance issues and Evaluation Considerations', IETF RFC2501, Jan. 1999
13 R. Housley, W. Polk, W. Ford, and D. Solo,' Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile', IETF RFC3280, April 2002