Advanced Search
Volume 31 Issue 9
Dec.  2010
Turn off MathJax
Article Contents
Zhou Nan-run, Wan Hui. Distributed Authentication Scheme for Cluster-Based Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273
Citation: Zhou Nan-run, Wan Hui. Distributed Authentication Scheme for Cluster-Based Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273

Distributed Authentication Scheme for Cluster-Based Ad hoc Networks

doi: 10.3724/SP.J.1146.2008.01273 cstr: 32379.14.SP.J.1146.2008.01273
  • Received Date: 2008-10-06
  • Rev Recd Date: 2009-04-09
  • Publish Date: 2009-09-19
  • Authentication is critical to secure communication in Ad hoc networks. This paper discusses the shortcomings of distributed authentication schemes in Ad hoc networks with flat structure and the advantages of adopting clustering structure. A zone authentication scheme is proposed to enhance the efficiency of authentication services with less communication cost. The scheme adopts the clustering structure and divides the networks into independent authentication areas, and fits well in the large Ad hoc networks with better scalability and security.
  • loading
  • Ramanathan R and Redi J. A brief overview of mobile Adhoc networks: challenges and directions [J]. IEEECommunications Magazine, 2002, 40(5): 20-22.[2]Zhou Li-dong and Haas Z J. Securing Ad hoc networks [J].IEEE Networks Special Issue on Network Security, 1999, 13(6): 24-30.[3]Kong J J, Zerfos P, and Luo H Y, et al.. Providing robust andubiquitous security support for mobile Ad hoc networks [C].IEEE 9th International Conference on Network Protocols,Riverside, California, USA, 2001: 251-260.[4]Herzberg A, Jakobsson M, and Jarecki S, et al.. Proactivepublic-key and signature schemes [C]. Proc of the 4th AnnualConference on Computer Communications Security, Zurich,Switzerland, 1997: 100-110.[5]葛蒙, 赵曦滨, 林国恩. 适用于移动自组织网的鲁棒性密钥管理[J]. 清华大学学报(自然科学版), 2008, 48(7): 1194-1197.Ge Meng, Zhao Xi-bin, and Lam Kwok-yan. Robust keymanagement for mobile Ad hoc networks [J]. Journal ofTsinghua University (Science and Technology), 2008, 48(7):1194-1197.[6]王化群, 张力军, 赵君喜. Ad hoc网络中基于环Zn上椭圆曲线和RSA的密钥管理[J]. 通信学报, 2006, 27(3): 1-6.Wang Hua-qun, Zhang Li-jun, and Zhao Jun-xi. Keymanagement based on elliptic curves over the ring Zn andRSA in Ad hoc networks [J]. Journal on Communications,2006, 27(3): 1-6.[7]熊焰, 苗付友, 张伟超, 等. 移动自组网中基于多跳步加密签名函数签名的分布式认证[J]. 电子学报, 2003, 31(2): 161-165.Xiong Yan, Miao Fu-you, Zhang Wei-chao, et al.. Securedistributed authentication based on multi-hop signing withencrypted signature functions in mobile Ad hoc networks [J].Acta Electronica Sinica, 2003, 31(2): 161-165.[8]Pietro R D, Mancini L V, and Zanin G. Efficient andadaptive threshold signatures for Ad hoc networks [J].Electronic Notes in Theoretical Computer Science.2007,171(1):93-105[9]安辉耀, 卢锡城, 彭伟. 移动自组网中一种基于簇的多路径路由算法[J]. 软件学报, 2007, 18(4): 987-995.An Hui-yao, Lu Xi-cheng, and Peng Wei. A cluster-basedmultipath routing algorithm in mobile Ad hoc networks [J].Journal of Software, 2007, 18(4): 987-995.[10]Gerla M and Tsai J T C. Multicluster, mobile, multimediaradio network [J]. ACM/Baltzer Journal of WirelessNetworks, 1995, 1(3): 225-265.[11]Dong Y, and Sui Ai-fen, et al.. Providing distributedcertificate authority service in cluster-based mobile Ad hocnetworks [J].Computer Communications.2007, 30(11/12):2442-2452[12]Bechler M, Hof H J, and Kraft D, et al.. A cluster-basedsecurity architecture for Ad hoc networks [C]. Proc of the23rd IEEE INFOCOM'04, Hong Kong, China, 2004, 4:2393-2403.[13]Pedersen T. A threshold cryptosystem without a trustedparty[C]. Proceeding of Crypto 91, Brighton, UK, 1991:522-526.[14]Spiewak D and Fusenig V, et al.. The importance of locationon trust in mobile networks [J]. WSEAS Transactions onCommunications, 2008, 7(5): 349-360.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3288) PDF downloads(871) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return