DocumentCode :
1822098
Title :
An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc Networks
Author :
Yeh, Ching-Hung ; Hsieh, Meng-Yen ; Li, Kuan-Ching
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Far East Univ., Tainan, Taiwan
fYear :
2012
fDate :
4-7 Sept. 2012
Firstpage :
388
Lastpage :
393
Abstract :
Mobile Ad hoc networks are composed of self organizing, multi-relaying nodes that do not rely on a fixed infrastructure and are lack of any centralized control. These characteristics make it to suffer from ineffective network performance and security attacks. Clustering have been devoted to organize all the nodes in mobile ad hoc network into a grouping architecture because it can provide basic levels network performance. However, in order to safeguard the clustering from malicious attacks, the node authentication in clustering is also an important issue. Since the nodes have a limitation of battery power, traditional solutions require each node to possess a pair of public and private keys like RSA which are not appropriate for them. In this paper, an efficient clustering authentication mechanism for mobile ad hoc networks is proposed to aim for the efficiency of certificate and authentication. For the purpose, each node in the same cluster have its private key respectively and share a common public key to reduce the authentication overhead. According to the security analysis and efficiency evaluation, the proposed mechanism is robust with certificate and authentication and is lightweight in terms of computational and communication requirements.
Keywords :
mobile ad hoc networks; private key cryptography; public key cryptography; telecommunication security; RSA; authentication overhead reduction; battery power; certificate efficiency; clustering authentication mechanism; efficiency evaluation; fixed infrastructure; grouping architecture; malicious attacks; mobile ad hoc networks; node authentication; private keys; public keys; security analysis; security attacks; self-organizing multirelaying nodes; Authentication; Logic gates; Mobile ad hoc networks; Public key; Routing; ad hoc networks; authentication; cluster; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4673-3084-8
Type :
conf
DOI :
10.1109/UIC-ATC.2012.134
Filename :
6332025
Link To Document :
بازگشت