By Topic

Routing security and authentication mechanism for mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yuh-Ren Tsai ; Inst. of Commun. Eng., Nat. Tsing Hua Univ., Hsinchu, Taiwan ; Shiuh-Jeng Wang

Mobile ad hoc networks (MANETs) are proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, MANETs introduce some new security issues. Especially, the routing security is the most important and complicated one. In this work, we propose a two-tier authentication mechanism for MANETs. The first tier, based on a hash function and the concept of MAC, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. This two-tier authentication mechanism can prevent internal and external attacks, including black hole, impersonation, routing table overflow and energy consummation attacks.

Published in:

Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th  (Volume:7 )

Date of Conference:

26-29 Sept. 2004