A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구

  • 양환석 (중부대학교 정보보호학과)
  • Published : 2013.03.30

Abstract

MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Keywords

References

  1. V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110. 501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.
  2. L. Rokach and O. Maimon, "Top-down induction of decision trees classifier - a survey," IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 35, no. 4, Nov. 2005, pp. 476-487. https://doi.org/10.1109/TSMCC.2004.843247
  3. 정혜원, "MANET에서 규칙을 기반으로 한 계층형 침입탐지에 관한 연구," 디지털산업정보학회지, 제6권, 제4호, 2010, pp. 153-160.
  4. T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts," G. Vigna, editor, Mobile Agents and Security, vol. 1419, LNCS, 1998, pp. 44-60.
  5. 서희석, 김상호, 이승재, "소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 121-129.
  6. S. Yi, R. Kravets, "MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks," 2nd Annual PKI Research Workshop Program(PKI 03), 2003, pp. 65-79.
  7. S. Garfinke, "PGP:Pretty Good Privacy," O'Reilly & Associates Inc., USA, 1995.
  8. S. Capkun, L. Buttyan, J. Hubaux, "Self-Orgranized Public-Key Management form Mobile Ad Hoc Networks," IEEE Trans on Mobile Computing, Vol. 2, No. 1, 2003, pp. 52-64. https://doi.org/10.1109/TMC.2003.1195151
  9. S. Basagni, M. Conti, S. Giodano, I. Stojmenovic, "Mobile Ad Hoc Networking," IEEE press, Wiley-Interscience, 2004.