Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. Our proposed protocol, called Authentication Protocol based on Hierarchical Clusters in Ad hoc Networks (AHCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We successfully included the establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and secure distribution of provisional session keys using shadow key certification of the threshold key configuration from CCHs.

[1]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Jinyang Li,et al.  Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .

[4]  Gene Tsudik,et al.  A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks , 2005, J. Inf. Sci. Eng..

[5]  Elizabeth M. Belding-Royer,et al.  Multi-Level Hierarchies for Scalable Ad hoc Routing , 2003, Wirel. Networks.

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  H. S. Suh,et al.  DSRR Organizing and Its Algorithm for Efficient Mobility Management in the SIP , 2004 .

[8]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Stefano Basagni,et al.  Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[11]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[12]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[13]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[14]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Edward J. Coyle,et al.  Minimizing communication costs in hierarchically-clustered networks of wireless sensors , 2004, Comput. Networks.

[16]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[17]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[18]  Dharma P. Agrawal,et al.  TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.