Browse > Article

Trustworthy authentication and key management for NSDR ad-hoc network  

Rhee, Chung Sei (충북대학교 소프트웨어학과)
Publication Information
Abstract
In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.
Keywords
ad-hoc network; dynamic routing; security; public key; private key; certification; topology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Z. J. Haas, " A New Routing Protocol for the Re-configurable wireless network", http://www.ee.cornell.edu/ April 1, 2000
2 Y. Desmedt, "Threshold Cryptography", European Transaction on Telecommunications", 5(4) : pp 449-459, July, 1994
3 Zygmunt J. Haas, Marc R. Pearlman, Prince Samar, "The Zone Routing Protocol(ZRP) for Ad Hoc Networks-IETF draft', 1997
4 Charles Perkins, E. M. Royer, "Ad-hoc On-Dem and Distance Vector Routing"
5 Ching-Chun Chiang, Hsiao-Kuang Wu, Wenston Liu, Mario Gerla, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel", 1997
6 The Bluetooth Special Interest Group, Specification of Bluetooth System, vol. 1: Core, v1.0 B, Dec 1999
7 E. M. Royer and C. K . Toh, "A review of current Routing Protocols for Ad Hoc Mobile wireless Network", Proc. IEEE Personal Communication, 99, April 1999
8 L. Zhou and Z. J. Haas, "Securing Ad Hoc networks", IEEE Network, Vol 13, No. 6, Nov, 1999