Title :
Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs)
Author :
Ghalwash, Atef Z. ; Youssif, Aliaa A A ; Hashad, Sherif M. ; Doss, Robin
Author_Institution :
Helwan Univ., Cairo
Abstract :
In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node´s public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the central authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.
Keywords :
ad hoc networks; interpolation; mobile radio; public key cryptography; telecommunication network topology; telecommunication security; Lagrange interpolation; central authority; distributed authentication architecture; mobile ad hoc network; public key cryptography; self adjusted security architecture; telecommunication network topology; threshold key management technique; Ad hoc networks; Authentication; Certification; Cryptographic protocols; Lagrangian functions; Mobile ad hoc networks; Network topology; Public key; Public key cryptography; Robustness; Authentication; certificate authority (CA) and Warrant node.; mobile ad hoc network (MANETs);
Conference_Titel :
Computer and Information Science, 2007. ICIS 2007. 6th IEEE/ACIS International Conference on
Conference_Location :
Melbourne, Qld.
Print_ISBN :
0-7695-2841-4
DOI :
10.1109/ICIS.2007.163