Two-tier authentication for cluster and individual sets in mobile ad hoc networks

被引:3
|
作者
Tsai, Yuh-Ren [1 ]
Wang, Shiuh-Jeng
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 300, Taiwan
关键词
mobile ad hoc networks (MANETs); authentication; routing security; secret sharing; hash function;
D O I
10.1016/j.comnet.2006.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) have been proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, some new security issues have arisen with the introduction of MANETs. Routing security, in particular, is an important and complicated issue. In this work, we propose a two-tier authentication scheme for cluster and individual sets, in MANETs. The first tier, based on a hash function and the MAC concept, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. The scenario of two-tier authentication can prevent internal and external attacks, including black holes, impersonation, routing table overflows and energy consummation attacks. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:883 / 900
页数:18
相关论文
共 50 条
  • [41] Node Level Security Management and Authentication in Mobile Ad Hoc Networks
    Savola, Reijo M.
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 449 - 458
  • [42] Self-Organized Authentication in Mobile Ad-Hoc Networks
    Caballero-Gil, Pino
    Hernandez-Goya, Candelaria
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (05) : 509 - 517
  • [43] Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
    Freudiger, Julien
    Raya, Maxim
    Hubaux, Jean-Pierre
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 350 - 372
  • [44] Opportunistic Node Authentication in Intermittently Connected Mobile Ad Hoc Networks
    Ma, Yaozhou
    Jamalipour, Abbas
    2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 453 - 457
  • [45] Biometric-based user authentication in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    Leung, Victor C. M.
    Liu, Jie
    Lung, Chung-Horng
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 5 - 16
  • [46] An electronic voting protocol with deniable authentication for mobile ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Liu, Chi-Yu
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2534 - 2540
  • [47] An authentication service against dishonest users in mobile ad hoc networks
    Ngai, ECH
    Lyu, MR
    Chin, RT
    2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 1275 - 1285
  • [48] Cluster-Based Autoconfiguration for Mobile Ad hoc Networks
    Longjiang Li
    Yunze Cai
    Xiaoming Xu
    Wireless Personal Communications, 2009, 49 : 561 - 573
  • [49] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [50] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +