Advertisement

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol

  • JiHyung Lim
  • DaeHun Nyang
  • Jeonil Kang
  • KyungHee Lee
  • Hyotaek Lim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)

Abstract

Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. Therefore, it needs authentication against the mobile nodes. To make that possible, we have two methods: single Certificate Authority(CA) and distributed CA. In the case of single CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little safer than previous one because it needs attacks toward a lot of CAs to collapse the network. We can consider secret sharing scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method, and show the results of simulation.

Keywords

Ad Hoc Network Security Authentication Certificate Issuing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, J.: A Scalable Location Service for Geographic Ad Hoc Routing. In: 6th ACM International Conference on Mobile computing and Networking (MobiCom 2000), August 2000, pp. 120–130 (2000)Google Scholar
  2. 2.
    Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6) (November 1999)Google Scholar
  3. 3.
    Kong, J.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE 9th International Conference on Network Protocols (ICNP 2001), pp. 251–260 (2001)Google Scholar
  4. 4.
    Shamir, A.: How to Share a Secret. Communication of the ACM, 612–613 (November 1979)Google Scholar
  5. 5.
    Pedersen, T.P.: A threshold cryptosystem without a trusted party, Advances in Cryptology. In: Proceedings of the CRYPTO 1991, pp. 522–526 (1991)Google Scholar
  6. 6.
    Carter, S., Yasinsac, A.: Secure Position Aided Ad hoc Routing Protocol. In: Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN 2002), November 3-4 (2002)Google Scholar
  7. 7.
    Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing 2001 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • JiHyung Lim
    • 1
  • DaeHun Nyang
    • 1
  • Jeonil Kang
    • 1
  • KyungHee Lee
    • 2
  • Hyotaek Lim
    • 3
  1. 1.Information Security Research LaboratoryINHA UniversityKorea
  2. 2.Department of Electrical EngineeringUniversity of SuwonKorea
  3. 3.DongSeo UniversityKorea

Personalised recommendations