Distributed certificate authority under the GRID-location aided routing protocol

Ji Hyung Lim, Dae Hun Nyang, Jeonil Kang, Kyung Hee Lee, Hyotaek Lim

Research output: Contribution to journalConference articlepeer-review

Abstract

Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. Therefore, it needs authentication against the mobile nodes. To make that possible, we have two methods: single Certificate Authority(CA) and distributed CA. In the case of single CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little safer than previous one because it needs attacks toward a lot of CAs to collapse the network. We can consider secret sharing scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method, and show the results of simulation.

Original languageEnglish
Pages (from-to)380-387
Number of pages8
JournalLecture Notes in Computer Science
Volume3983 LNCS
DOIs
StatePublished - 2006
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 8 May 200611 May 2006

Keywords

  • Ad Hoc Network Security
  • Authentication
  • Certificate Issuing

Fingerprint

Dive into the research topics of 'Distributed certificate authority under the GRID-location aided routing protocol'. Together they form a unique fingerprint.

Cite this