Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

  • Authors:
  • Keun-Ho Lee;Sang-Bum Han;Heyi-Sook Suh;Chong-Sun Hwang;SangKeun Lee

  • Affiliations:
  • Department of Computer Science and Engineering, Korea University, Seoul, Korea;Department of Computer Science and Engineering, Korea University, Seoul, Korea;Ministry of Education & Human Resources Development, Information Technology, Seoul, Korea;Department of Computer Science and Engineering, Korea University, Seoul, Korea;Department of Computer Science and Engineering, Korea University, Seoul, Korea

  • Venue:
  • APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.