By Topic

TAKCS: threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Keun-Ho Lee ; Dept. of Comput. Sci. & Eng., Korea Univ., Seoul ; Chong-Sun Hwang

Initial studies in mobile ad hoc routing has considered only the problem of providing efficient routing protocols for finding paths in very dynamic networks, without considering security. Because of this, ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure based wireless networks. Our proposed protocol incorporates an end-to-end authentication protocol that relies on a mutual trust between nodes in other clusters. The scheme strategy takes advantage of the threshold certification based end-to-end authentication protocol in large ad hoc networks. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We present detailed security threats against multilayer cluster routing scheme. We successfully included the establishment of mutual end-to-end authentication, the prevention of node identity fabrication, and the secure distribution of provisional session keys using certification threshold key configuration by CCH (control cluster head)

Published in:

Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference  (Volume:1 )

Date of Conference:

20-22 Feb. 2006