Browse > Article

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks  

Lee Keun-Ho (고려대학교 컴퓨터학과)
Han Sang-Bum (고려대학교 컴퓨터학과)
Suh Heyi-Sook (교육인적자원부 교육정보화기획과)
Lee Sang-Keun (고려대학교 컴퓨터학과)
Hwang Chong-Sun (고려대학교 컴퓨터학과)
Abstract
In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.
Keywords
security; authentication; ad hoc network; clustering; multi-layer; cluster head;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Basagni, 'Distributed clustering for ad hoc networks,' in: Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms, and Networks, pages 310-315, Jun. 1999
2 M. Bechler, H. -j. Hof, D. Kraft, F. Rahlke, L. Wolf, 'A Cluster-Based security architecture for ad hoc networks,' in: Proceedings of IEEE Conference on Computer Communications (INFOCOM) Hong Kong, March. 2004
3 Elizabeth M. BEDING-ROYER, 'Multi-level hierarchies for scalable ad hoc routing,' Wireless Networks archive Volume9, Issue 5, pages 461-478, Sept. 2003   DOI   ScienceOn
4 Y. Desmedt and Y. Frankel, 'Threshold cryptosystems,' Advances in Cryptology- Crypto '89 (Lecture Notes in Computer Science 435), G. Brassard, Ed, Springer-Verlag, page 307-15, Aug. 1990
5 M. Jiang, J. Li, and Y.C. Tay, 'Cluster based routing protocol (CBRP),' functional specification, IETF Internet Draft, MANET working group, draft-ietf-manet-cbrp-spec-01.txt, Aug. 1999
6 Lidong Zhou: Haas, Z.J.; 'Securing ad hoc networks,' IEEE Network, Volume: 13 Issue: 6, NOV.-Dec. pages 24-30, 1999   DOI   ScienceOn
7 Seema Bandyopadhyay, Edward J. Coyle, 'Minimizing communication costs in hierarchically clustered networks of wireless sensors,' Elsevier, Computer Networks 44 (2004) 1-16   DOI   ScienceOn
8 K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, 'A secure routing protocol for ad hoc networks,' in: Proceedings IEEE Network Protocols, pages 78-87, 2002
9 H.-S. Suh, S.-B. Han, K.-H. Lee, C.-S. Hwang, 'DSRR organization and its algorithm for efficient mobility management in the SIP,' IEICE TRANS. COMMUN., vol. E87-B, no. 7, pp. 1866-1873, July 2004
10 M. Steiner, G. Tsudik, and M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' 3rd ACM Conference on Computer and Computer and Communications Security, 1998   DOI