Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20]

@

Journal of Information Science and Engineering, Vol. 23 No. 2, pp. 539-567 (March 2007)

Authentication Protocol Using Threshold Certification in Hierarchical-cluster-based Ad Hoc Networks*

Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, Chong-Sun Hwang and Sangkeun Lee
Department of Computer Science and Engineering
Korea University
Seoul, 136-713 Korea

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

Keywords: security, authentication, ad hoc network, cluster, hierarchical, threshold, cluster head (CH), control cluster head (CCH), shadow key

Full Text () Retrieve PDF document (200703_12.pdf)

Received April 6, 2005; revised October 28, 2005, February 15 & March 9, 2006; accepted March 27, 2006.
Communicated by Tzong-Chen Wu.
* This research was supported by the MIC, Korea, under the ITRC support program supervised by the IITA.