DocumentCode :
2079884
Title :
An Effective Authentication Scheme in Mobile Ad Hoc Network
Author :
Shin, Kiho ; Kim, Yoonho ; Kim, Yanggon
fYear :
2006
fDate :
19-20 June 2006
Firstpage :
249
Lastpage :
252
Abstract :
The MANET (mobile ad hoc networks) has suffered from many security problems despite of its advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, especially when establishing security, the traditional certification services have many difficult problems in applying to the MANET because of its safety, expandability, and usability. In this paper, a secure and effective distributed certification service method was proposed using the secret sharing scheme and the threshold digital signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme copes with the problem that the whole network security would be damaged by the intrusion to one node in the centralized architecture and the hierarchical architecture scheme. Also, as the number of the nodes containing the partial confidential information of personal keys decreases, the risk of exposure of the private keys also in the fully distributed architecture decreases as well. By the network simulation, the features and availability of the proposed scheme were evaluated and analyzed in relation between the system parameters
Keywords :
ad hoc networks; authorisation; mobile computing; telecommunication security; authentication scheme; certification services; distributed certification service; fixed infrastructure independence; hierarchical architecture scheme; mobile ad hoc network; network security; network simulation; node mobility; personal keys; private keys; quick network establishment; secret sharing scheme; security problems; threshold digital signature; Analytical models; Authentication; Availability; Certification; Cryptography; Digital signatures; Information security; Mobile ad hoc networks; Safety; Usability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006. SNPD 2006. Seventh ACIS International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-7695-2611-X
Type :
conf
DOI :
10.1109/SNPD-SAWN.2006.18
Filename :
1640700
Link To Document :
بازگشت