Browse > Article

Design of Modified CGA for Address Autoconfiguration and Digital Signature in Hierarchical Ad Hoc Network  

Lee, Hye-Won (숭실대학교 컴퓨터학과)
Kim, Guk-Boh (대진대학교 컴퓨터공학과)
Mun, Young-Song (숭실대학교 컴퓨터학과)
Abstract
The CGA proposed by IETF working group prevents address spoofing and stealing and provides digital signature to users, but key collision problem arises. To solve this critical problem, the CGA defines the SEC field within address format, which is set to high value when high security is required and vice versa, but the CGA faces a dilemma between security and the processing time. As SEC value increases, the processing time to generate the CGA grows dramatically while key collision ratio increases if low SEC value is applied to the CGA. We propose modified CGA (MCGA) that has shorter processing time than the CGA and offers digital signature with small overheads. To solve key collision problem, we employ hierarchical ad hoc network. The MCGA is applicable to IPv6 networks as well public networks. In this paper, we design a mathematical model to analyze the processing time for MCGA and CGA first and evaluate the processing time via simulations, where the processing time for MCGA is reduced down 3.3 times when SEC value is set to 0 and 68,000 times when SEC value is set to 1. Further, we have proved that the CGA is inappropriate for both ad hoc networks and IPv6 networks when the SEC field is set to more than 3.
Keywords
modified CGA(MCGA); hierarchical ad hoc network; digital signature; address spoofing; address stealing; SHA; MD5; CGA(cryptographically generated address); SEC(SECurity parameter);
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Johnson, D. Maltz and Y. Hu, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),' work in progress, IETF, 2003
2 http://physics.harvard.edu/probweek/sol46.pdf, 'the birth problem,' Solution Week 46
3 J. Kulik, W. Heinzelman and H. Balakrishnann, 'Negotiation-Based Protocols for Disseminationg Information in Wireless Sensor Networks,' 2002
4 T. Aura, 'Cryptographically Generated Address,' RFC 3972, IETF, 2005
5 N. Moore, 'Optimistic Duplicate Address Duplication for IPv6,' work in progress, IETF, 2004
6 R. Rivest, 'The MD5 Message-Digest Algorithm,' RFC 1321, IETF, 1992
7 A. Misra, S. Das, A. McAuley and S. Das, 'Autoconfiguration, Registration, and Mobility Management for Pervasive Computing,' IEEE Personal Communication, August, 2001   DOI
8 D. Eastlake and P. Jones, 'US Secure Hash Algorithm,' RFC 3174, IETF, 2001
9 N. Vaidya, 'Duplicate Address Detection in Mobile Ad Hoc Networks,' MobiHoc'02, June 2002   DOI
10 H. Zhou, L. Ni and M. Mutka, 'Prophet Address Allocation for Large Scale MANET,' TwentySecond Annual Join Conference of the IEEE Computer and Communications Societies, Vol. 2. INFOCOM, IEEE, 2003   DOI
11 R. Droms, 'Dynamic Host Configuration Protocol, RFC 2131,' IETF, 1997
12 H. K. Lee and Y. Mun, 'Node configuration Protocol based on Hierarchical Network Architecture for Mobile Ad-Hoc networks,' ICOIN 2004, Lecture Notes in Computer Science 3090, 2004
13 S. Nesargi and R. Prakash, 'MANETconf: Configuration of Hosts in a Mobile ad Hoc Network,' Twenty-First Annual Join Conference of the IEEE Computer and Communications Societies, Vol. 2. INFOCOM, IEEE, 2002   DOI
14 C. Perkins, E. Belding-Royer and S. Das, 'Ad Hoc On-Demand Distance Vector (AODV) Routing, RFC 3561, IETF, 2003
15 F. Ogier, F. Templin and M. Lewis, 'Topology Dissemination Based on Reverse-Path Forwarding (TBRPF),' work in progress, IETF, 2003