Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.4.433

A Routing Security Authentication using S-EKE in MANET Environments  

Lee, Cheol-Seung (광주 여자대학교 교양.교직과정부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.4, 2014 , pp. 433-438 More about this Journal
Abstract
The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.
Keywords
MANET; MD5; EKE Authentication;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 B. Kadri, A. M'hamed, and M. Feham, "Secured Clustering Algorithm for Mobile Ad Hoc Networks," Int. J. of Computer Science and Network Security IJCSNS, vol. 7, no. 3, Mar. 2007, pp. 27-34.
2 Y.-D. Kim, "Performance of VoIP Traffics over MANETs under DDoS Intrusions," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 493-498.   과학기술학회마을
3 X. Jia, J. Wu, and Y. He, "Mobile Ad-hoc and Sensor Networks," Proc. Lecture Notes in Computer Science First International Conference MSN 2005, vol. 3794, Springer, 2005, pp. 164-174.
4 Y.-D. Kim, "Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions," J. of The Korea Institute of Electronic Communication Sciences vol. 7, no. 2, 2012, pp. 258-263.   과학기술학회마을
5 R. Zheng and R. Kravets, "On-demand power management for Ad Hoc networks," Twenty-Second Annual Joint Conf. of the IEEE Computer and Communications Societies 2003 (INFOCOM 2003), vol. 1, Mar. 2003, pp. 481-491.
6 K. Kim, S. Bae, and D. Kim, "An Enhanced Robust Routing Protocol in AODV over MANETs," J. of The Korea Institute of Electronic Communication Sciences, vol. 4, no. 1, 2009, pp. 13-18.   과학기술학회마을
7 C.-K. Toh, "Ad Hoc Mobile Wireless Networks Protocols and System," Prentice Hall, Jan. 2004, pp. 200-252.
8 A. Patwardhan, J. Parker, A. Joshi, A. Karygiannis, and M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks," Third IEEE Int. Conf. on Pervasive Computing and Communications, Mar. 2005.
9 V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password authenticated key exchange using Diffie_Hellman," Advances in Cryptology-Eurocrypt 2000, May 2000, pp. 14-18.
10 C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-803.   과학기술학회마을