期刊文献+

Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme

Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
原文传递
导出
摘要 Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide ou-llne access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices. Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide ou-llne access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第6期997-1011,共15页 计算机科学技术学报(英文版)
关键词 ad hoc network PKI CBSRP ID-BASED inter-cluster cluster-based CA (Certificate Authority) ad hoc network, PKI, CBSRP, ID-based, inter-cluster, cluster-based, CA (Certificate Authority)
  • 相关文献

参考文献34

  • 1Lin H Y, Huang Y M. Information service on scalable ad-hoc mobile wireless networks. In Proc. the IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, China, Oct. 2003, pp.190-196.
  • 2Ding L, Lai C S, Huang Y M. Password-only authenticated key establishment protocol without public key cryptography. IEE Electronic Letters, Feb. 2005, 41(4): 185-186.
  • 3Asokan N, Ginzboorg P. Key agreement in ad hoc networks. Computer Communications, 2000, 23(17): 1627-1637.
  • 4Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols. IEEE J. Selected Areas in Communications, April 2000, 18(4): 628-639.
  • 5Kong J, Zerfos P, Luo H et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. the 9th Int. Conf. Network Protocols, Riverside, California, USA, Nov. 2001, pp.251-260.
  • 6Ghazizadeh S, Ilghami O, Sirin E, Yaman F. Security-aware adaptive dynamic source routing protocol. In Proc. the 27th Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, Nov. 2002, pp.751-760.
  • 7Yi S, Naldurg P, Kravets R. Security-aware ad hoc routing for wireless networks. In Proc. the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Long Beach, California, USA, Aug. 2001, pp.299-302.
  • 8Lin H Y, Huang Y M, Wang T I. Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks. IEICE Trans. Communications, Sept. 2005, E88-B(9): 3598-3613.
  • 9Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine, Nov./Dec. 1999, 13(6): 24-30.
  • 10Shen C C, Srisathapornphat C, Liu R et al. CLTC: A cluster-based topology control framework for ad hoc networks. IEEE Trans. Mobile Computing, Jan.-Feb. 2004, 3(1): 18-32.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部