Two-tier authentication for cluster and individual sets in mobile ad hoc networks

  • Authors:
  • Yuh-Ren Tsai;Shiuh-Jeng Wang

  • Affiliations:
  • Institute of Communications Engineering National Tsing Hua University 101, Sec. 2, Kuang-Fu Road, Hsinchu 300, Taiwan, ROC;Department of Information Management, Central Police University Taoyuan 333, Taiwan, ROC

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile ad hoc networks (MANETs) have been proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, some new security issues have arisen with the introduction of MANETs. Routing security, in particular, is an important and complicated issue. In this work, we propose a two-tier authentication scheme for cluster and individual sets, in MANETs. The first tier, based on a hash function and the MAC concept, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. The scenario of two-tier authentication can prevent internal and external attacks, including black holes, impersonation, routing table overflows and energy consummation attacks.