Browse > Article

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks  

Choi, Sung-Jae (연세대학교 컴퓨터학과)
Kim, Yong-Woo (연세대학교 컴퓨터학과)
Lee, Hong-Ki (연세대학교 컴퓨터학과)
Song, Joo-Seok (연세대학교 컴퓨터학과)
Nyang, Dae-Mon (인하대학교 정보통신대학원)
Abstract
In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.
Keywords
Ad hoc network; flooding; security; certificate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc networks,' IEEE ICNP '2001, 2001
2 W. Peng and X. Lu, 'On the reduction of broadcast redundancy in mobile ad hoc networks,' In Proceedings of MOBIHOC, 2000
3 W. Lou and J. Wu, 'On reducing broadcast redundancy in ad hoc wireless networks,' IEEE Transactions on Mobile Computing, vol.1, no. 2, Apr 2002   DOI   ScienceOn
4 L. Zhou and Z. Haas, 'Securing ad hoc networks,' IEEE Newark Megazine, vol.13, no.6, Dec 1999   DOI   ScienceOn
5 L. Venkatraman and D. Agrawal, 'A Novel Authentication scheme for Ad hoc networks', IEEE 2000, Nov 2002   DOI
6 S. Tseng, Y. Chen and J. Sheu, 'The broadcast storm problem in a mobile ad hoc network,' In Proceedings of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile System(MSWIM), 2000   DOI
7 B. Williams, and T. Camp, 'Comparison of broadcasting techniques for mobile ad hoc networks', In Proceedings of the ACM International Symposium on Mobile Ad Hoc networking and Computing(MOBIHOC), pp. 194-205, 2002   DOI
8 S. Capkun, L. Buttyan and J. Hubaux, 'SelfOrganized Public-key Management for Mobile Ad Hoc networks,' IEEE transactions on mobile computing vol.2, no.1, Jan 2003   DOI   ScienceOn
9 H. Lim and C. Kim, 'Flooding in Wireless Ad Hoc networks,' Computer Comm..J vol.24, no. 3-4, pp. 353-363, 2001   DOI   ScienceOn