Cluster-Based Certificate Chain for Mobile Ad Hoc Networks

A recent trend of wireless technology is to set up the wireless connections among close-by mobile nodes. This class of network is called as Mobile Ad Hoc Network (MANET). In MANET, mobile nodes can temporarily form a network and they cooperatively offer several functions. Hence, it is hard to apply traditional security techniques such as public key certification based on PKI. In this paper, we propose a practical model of public key certificate chain for MANET. Our scheme does not rely on a central server, but rather we utilize the Cluster-Based Routing Protocol (CBRP) for MANET to issue certificates in a distributed fashion. In our scheme, the certificates are chained very effectively and the signed messages can be transferred over certificate chain. Our scheme works well in a setting where the network topology is dynamically changed. Also, our scheme is more efficient than the related localized scheme [15].

[1]  M.R. Shikh-Bahaei,et al.  Interference cancellation in W-CDMA cellular structures using statistical processing , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).

[2]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[3]  Peng Liu,et al.  Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[6]  Joseph E. Wilkes,et al.  Privacy and authentication needs of PCS , 1995, IEEE Wirel. Commun..

[7]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[8]  Zygmunt J. Haas,et al.  On the impact of alternate path routing for load balancing in mobile ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[9]  David R. Karger,et al.  A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.

[10]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[11]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[12]  JooSeok Song,et al.  Secure cluster based routing protocol incorporating the distributed PKI mechanisms , 2004, Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521).

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[15]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[16]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .