Routing Security and Authentication Mechanism

Routing Security and Authentication Mechanism - Routing...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks Yuh-Ren Tsai Institute of Communications Engineering, National Tsing Hua University 101, Sec. 2, Kuang-Fu Rd., Hsinchu 300, Taiwan yrtsai@ee.nthu.edu.tw Shiuh-Jeng Wang Department of Information Management, Central Police University Taoyuan, Taiwan 3333 sjwang@sun4.cpu.edu.tw Abstract —Mobile ad hoc networks (MANETs) is proposed as an extremely flexible technology for establishing wireless communications. In comparison with fixed networks or traditional mobile cellular networks, MANETs introduce some new security issues. Especially, the routing security is the most important and complicated one. In this work, we propose a two- tier authentication mechanism for MANETs. The first tier, based on hash function and the concept of MAC, provides fast message verification and group identification. The second tier, based on secret sharing technology, provides secure user identification. This two-tier authentication mechanism can prevent internal and external attacks, including black hole, impersonation, routing table overflow and energy consummation attacks. Keywords—Mobile ad hoc networks (MANET); Authentication; Routing security; Secret sharing; Hash function. I. INTRODUCTION An ad hoc network is formed by a collection of self- governing nodes which can communicate with each other without any fixed infrastructure, such as base stations or mobile switching centers, or any centralized administration. Due to limited radio propagation coverage, each node can only connect to a few neighboring nodes. If the communication link between any two nodes which are not in the same radio coverage area is required, a multiple-hop radio connection relying on other intermediate nodes to relay messages is established to provide services. If the nodes of ad hoc networks are mobile and with wireless communication to maintain the connectivity, it is known as mobile ad hoc network (MANET) and is proposed as an extremely flexible technology for establishing communications in situations which demand a fully decentralized network without any fixed base stations, such as battlefields, military applications, and other emergency and disaster situations. Since all nodes are mobile, the network topology of a MANET is generally dynamic and may change frequently. In comparison with fixed networks or traditional mobile cellular networks, MANETs introduce some new security issues; especially, the routing security is the most important and complicated one [1]-[5]. In this work, we propose a two- tier authentication mechanism according to the characteristics of MANETs. The first tier is the cluster authentication and the second tier is the individual authentication. The rest of this paper is organized as follows. In section II we will illustrate the routing security problems in MANETs. Section III concentrates on the proposed authentication mechanism. In Section IV, the discussions for our proposal are presented.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

Routing Security and Authentication Mechanism - Routing...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online