Two-tier authentication for cluster and individual sets in mobile ad hoc networks

被引:3
|
作者
Tsai, Yuh-Ren [1 ]
Wang, Shiuh-Jeng
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 300, Taiwan
关键词
mobile ad hoc networks (MANETs); authentication; routing security; secret sharing; hash function;
D O I
10.1016/j.comnet.2006.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) have been proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, some new security issues have arisen with the introduction of MANETs. Routing security, in particular, is an important and complicated issue. In this work, we propose a two-tier authentication scheme for cluster and individual sets, in MANETs. The first tier, based on a hash function and the MAC concept, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. The scenario of two-tier authentication can prevent internal and external attacks, including black holes, impersonation, routing table overflows and energy consummation attacks. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:883 / 900
页数:18
相关论文
共 50 条
  • [1] Two-tier slotted aloha in mobile ad hoc networks
    Zheng, Di
    Yao, Yu-Dong
    Graff, Charles
    Cook, Trevor
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3626 - +
  • [2] A two-tier intrusion detection system for mobile ad hoc networks - A friend approach
    Razak, Shukor Abd
    Fumell, Steven
    Clarke, Nathan
    Brooke, Phillip
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 590 - 595
  • [3] A two-tier representation of node mobility in ad hoc networks
    Zaidi, ZR
    Mark, BL
    Thomas, RK
    2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 153 - 161
  • [4] Stable Backbone Hosts and Stable Multicast Routes in Two-Tier Mobile Ad Hoc Networks
    Hu, Chia-Cheng
    Wu, Eric Hsiao-Kuang
    Chen, Gen-Huey
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (09) : 5020 - 5036
  • [5] Energy-conserving clustering scheme for multicasting in two-tier mobile ad-hoc networks
    Ryu, JH
    Song, S
    Cho, DH
    ELECTRONICS LETTERS, 2001, 37 (20) : 1253 - 1255
  • [6] Zone-based hierarchical routing in two-tier backbone ad hoc networks
    Huang, TC
    Liao, CK
    Dow, CR
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 650 - 654
  • [7] Design and implementation of two-tier Mobile Ad Hoc Networks with seamless roaming and load-balancing routing capability
    Hsu, YY
    Tseng, YC
    Tseng, CC
    Huang, CF
    Fan, JH
    Wu, HL
    FIRST INTERNATIONAL CONFERENCE ON QUALITY OF SERVICE IN HETEROGENEOUS WIRED/WIRELESS NETWORKS, PROCEEDINGS, 2004, : 52 - 58
  • [8] A hierarchical two-tier information management architecture for mobile ad-hoc grid environments
    Zottl, Joachim
    Gansterer, Wilfried N.
    Hlavacs, Helmut
    CCGRID 2007: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, 2007, : 707 - +
  • [9] Trust and Cluster based Authentication schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON POWER SIGNALS CONTROL AND COMPUTATIONS (EPSCICON), 2014,
  • [10] An Energy-Efficient Approach to the Design of Two-Tier Wireless Ad Hoc and Sensor Networks
    Martyna, Jerzy
    MAN-MACHINE INTERACTIONS 3, 2014, 242 : 579 - 587