DOI QR코드

DOI QR Code

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra (Department of Computer Science and Engineering, Acharya Nagarjuna University) ;
  • Prasad, Ramineni Sivarama (Department of Computer Science and Engineering, Acharya Nagarjuna University)
  • Received : 2014.01.15
  • Accepted : 2014.07.28
  • Published : 2014.10.31

Abstract

In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Keywords

References

  1. R. Murugan and A. Shanmugam, "A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks", Journal of Computer Science 6.12 (2010). Article (CrossRef Link)
  2. Abderrezak RACHEDI and Abderrahim BENSLIMANE, "Impacts and Solutions of Control Packets Vulnerabilities with IEEE 802.11 MAC", Wireless communications and mobile computing 9.4 (2009). Article (CrossRef Link)
  3. G.A. Safdar and M. McLoone, "Randomly Shifted Certification Authority Authentication Protocol for MANETs", Mobile and Wireless Communications Summit, 2007, 16th IST, IEEE, 2007. Article (CrossRef Link)
  4. Sadasivam, Karthik and T. Andrew Yang. "Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks". M.H. Hamza, P. Prapinmonkolkarn, T. Angkaew. (Eds): Proc. of the IASTED Int. Multi-Conf. on Networks and Communication Systems (NCS 2005).Krabi, Thailand. April'18-20, 2005. Article (CrossRef Link)
  5. Hongqiang Zhai, Jianfeng Wang, Xiang Chen and Yuguang Fang, "Medium access control in mobile ad hoc networks: challenges and solutions", Wireless Communications and Mobile Computing 6.2 (2006). Article (CrossRef Link)
  6. K.Suresh Babu and K.Chandra Sekharaiah, "CBDAT: Cross Layer Based Detection and Authentication Technique for MANET", IJCSNS International Journal of Computer Science and Network Security, 22 VOL.13 No.7, July 2013. Article (CrossRef Link)
  7. Gulshan Kumar and Mritunjay Rai, "Assured Neighbor Based Counter Protocol on Mac-Layer Providing Security in Mobile Ad Hoc Networks", Academy & Industry Research Collaboration Center, Jul 2011. Article (CrossRef Link)
  8. Alejandro Cornejo, Nancy Lynch, Saira Viqar and Jennifer L. Welch, "Neighbor Discovery in Mobile Ad Hoc Networks Using an Abstract MAC Layer", Communication, Control, and Computing, 2009. Allerton 2009 47th Annual Allerton Conference on IEEE 2009. Article (CrossRef Link)
  9. Gaurav Kulkarni and Brajesh Patel, "Time Stamp Based Cross Layer MANET Security Protocol", Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 10 Version 1.0 Year 2013. Article (CrossRef Link)
  10. Network Simulator, Article (CrossRef Link)
  11. T.R.Panke, "Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET", International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013. Article (CrossRef Link)
  12. Priti Rathi and Parikshit Mahalle, "Proposed Threshold Based Certificate Revocation in Mobile Ad Hoc Networks", Intelligent Computing, Networking and Informatics ,Advances In Intelligent Systems and Computing , Volume 243,2014,pp377-388. Article (CrossRef Link)
  13. T.Buvaneswari and A. Antony Truth Ayaraj, "Novel Accuser of Security Based Certificate Revocation in MANET", International Global Research Analysis (GRA), Vol. 2, Issue. 11, pp. 94-98, Nov 2013. Article (CrossRef Link)
  14. A. Praveena and L.M. Nithya, "Cluster Enhanced Secure Authentication Scheme For Data Integrity In MANET", International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April-2014, pg. 693-700. Article (CrossRef Link)