Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Chong Sun Hwang, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The scheme strategy takes advantage of threshold authenticated key configuration in large ad hoc networks. We propose an authentication scheme that uses certificates containing an asymmetric key using the threshold cryptography scheme, thereby reducing the computational overhead and successfully defeating all identified attacks.

Original languageEnglish
Title of host publicationAdvanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops
Subtitle of host publicationXRA, IWSN, MEGA, and ICSE, Proceedings
Pages321-329
Number of pages9
Publication statusPublished - 2006
EventAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE - Harbin, China
Duration: 2006 Jan 162006 Jan 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3842 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE
Country/TerritoryChina
CityHarbin
Period06/1/1606/1/18

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc'. Together they form a unique fingerprint.

Cite this