Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. Therefore, it needs authentication against the mobile nodes. To make that possible, we have two methods: single Certificate Authority(CA) and distributed CA. In the case of single CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little safer than previous one because it needs attacks toward a lot of CAs to collapse the network. We can consider secret sharing scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method, and show the results of simulation.
|Number of pages||8|
|Journal||Lecture Notes in Computer Science|
|State||Published - 2006|
|Event||ICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom|
Duration: 8 May 2006 → 11 May 2006
- Ad Hoc Network Security
- Certificate Issuing