Based on the characteristic of the Mobile Ad Hoc Network (MANET for short), this paper proposes a secure protocol of MANET by the means of clustering. In this protocol, all the nodes within the networks are elustered into several clusters. Here we analyze how to calculate the trust value between the nodes according to their interaction behaviors. Based on the trust value, we can judge whether the connection between the two nodes is trusted or not. According to the number of the trust connections, we can select the cluster head within the cluster, and the nodes which have trust connection with cluster head will be the core nodes, the cluster head and core nodes can join together to be the service group for the cluster, the service group is in charge of providing service for various requests from cluster members. Each node will distributed a secret share which will be a part of secret key for itself, and come into being the authentication parameter in the proceeding of investigation about the update qualification in the next circle, and the secret share can also be authenticated by the node itself. Once one node has been verified as a malicious node, cluster head will broadcast the news to all the cluster members and refuse to provide updating service for the malicious node. Because of that, the malicious node will be shielded by the cluster for ever. The protocol has absolute forward secrecy and backward secrecy [1]. The keys of nodes and cluster are generated after consultation among the service group members [2], Man-in-the-middle attack can be resisted by this way. At the same time, the cluster can achieve the periodic update, the cluster head will be reselected, service group will be reformed, subsequently, the key of cluster and nodes will updated as well. Above all, what we have done in this paper will make sure the MANET will run in a safer and more efficiency conditions.
[1]
Hugo Krawczyk,et al.
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
,
1995,
CRYPTO.
[2]
Dharma P. Agrawal,et al.
TIDS: threshold and identity-based security scheme for wireless ad hoc networks
,
2004,
Ad Hoc Networks.
[3]
Hamamache Kheddouci,et al.
ECGK: An efficient clustering scheme for group key management in MANETs
,
2010,
Comput. Commun..
[4]
Adi Shamir,et al.
Identity-Based Cryptosystems and Signature Schemes
,
1984,
CRYPTO.
[5]
R. Michael Buehrer,et al.
A self-organized clustering algorithm for UWB ad hoc networks
,
2004,
2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[6]
David Chaum,et al.
Wallet Databases with Observers
,
1992,
CRYPTO.
[7]
John W. Rittinghouse,et al.
Wireless Operational Security
,
2004
.
[8]
Chris McDonald,et al.
Establishing Trust In Pure Ad-hoc Networks
,
2004,
ACSC.
[9]
Meng Wu,et al.
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks
,
2008,
Fifth International Conference on Information Technology: New Generations (itng 2008).