DocumentCode :
1831811
Title :
TAKCS: threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks
Author :
Lee, Keun-Ho ; Hwang, Chong-Sun
Author_Institution :
Dept. of Comput. Sci. & Eng., Korea Univ., Seoul
Volume :
1
fYear :
2006
fDate :
20-22 Feb. 2006
Lastpage :
496
Abstract :
Initial studies in mobile ad hoc routing has considered only the problem of providing efficient routing protocols for finding paths in very dynamic networks, without considering security. Because of this, ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure based wireless networks. Our proposed protocol incorporates an end-to-end authentication protocol that relies on a mutual trust between nodes in other clusters. The scheme strategy takes advantage of the threshold certification based end-to-end authentication protocol in large ad hoc networks. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We present detailed security threats against multilayer cluster routing scheme. We successfully included the establishment of mutual end-to-end authentication, the prevention of node identity fabrication, and the secure distribution of provisional session keys using certification threshold key configuration by CCH (control cluster head)
Keywords :
ad hoc networks; cryptography; mobile radio; protocols; telecommunication network routing; telecommunication security; TAKCS; asymmetric key; certification threshold key configuration; control cluster head; detailed security threats; dynamic networks; infrastructure based wireless networks; mobile ad hoc networks; mobile ad hoc routing; multilayer cluster; multilayer cluster routing scheme; mutual trust; node identity fabrication; provisional session keys; routing protocols; security attacks; threshold authentication key configuration scheme; threshold certification based end-to-end authentication protocol; threshold cryptography scheme; Ad hoc networks; Authentication; Certification; Cryptographic protocols; Cryptography; Fabrication; Mobile ad hoc networks; Nonhomogeneous media; Routing protocols; Wireless networks; Ad Hoc Network; Authentication; Cluster; Multilayer; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
Conference_Location :
Phoenix Park
Print_ISBN :
89-5519-129-4
Type :
conf
DOI :
10.1109/ICACT.2006.206015
Filename :
1625620
Link To Document :
بازگشت