Computer Science ›› 2017, Vol. 44 ›› Issue (3): 145-149.doi: 10.11896/j.issn.1002-137X.2017.03.032

Previous Articles     Next Articles

Lightweight and Shifted CA Architecture for MANET

GUO Ping, FU De-sheng, ZHU Jie-zhong and CHENG Ya-ping   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In order to solve the problem that it is difficult to adopt more security and complex authentication mechanisms in mobile Ad hoc network (MANET) because of the opening communication channels,highly dynamic moving and sources-constrained nodes,a lightweight and shifted certificate authority (LSCA) authentication architecture for MANET was put forward,which is combined with an idea of lightweight CA,and it’s designed for MANET with short lifetime and highly dynamic topology.LSCA is equipped with the advantage of lightweight CA through simplifying the traditional certificate-based CA,which needs no certificates.Moreover,LSCA,through the transfer of the overall CA among a number of alternative CA nodes in a regular rotation,is not needed to preset nodes and know the topology of MANET,and the system is attained a certain degree of tolerance.Analysis and simulation results show that LSCA has robust resistance for DoS attacks,balances the tradeoff between communication,computation and storage,which is better than distributed CA and CA with threshold mechanism,and is especially suitable for the topology of very dynamic MANET networks.

Key words: Wireless network security,Mobile Ad hoc network(MANET),Lightweight and shifted certificate authority(LSCA),Authentication architecture

[1] PKIX Working Group.Public key infrastructure (X.509)[EB/OL].The Internet Engineering Task Force (IETF).[2011-8-16].http://www.ietf.org/html.charters/pkix-charter.html.
[2] ANITA E A M,VASUDEVAN V,ASHWINI A.A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs[C]∥Proc of 2011 IEEE International Conference on Communication Control and Computing Technologies.Ramanathapuram:IEEE,2011:407-412.
[3] LUO H,KONG J,ZERFOS P,et al.URSA:ubiquitous and robust access control for mobile Ad hoc networks[J].ACM Transactions on Networking,2004,12(6):1049-1063.
[4] CHAN A C.Distributed private key generation for identitybased cryptosystems in Ad hoc networks [J].Wireless Communication Letters,2012,1(1):46-48.
[5] CCAPKUN S,BUTTYAN L,HUBAUX J P.Self-organizedpublic key management for mobile Ad hoc networks [J].IEEE Transaction on Mobile Computing,2003,2(1):52-64.
[6] HAMOUID K.Self-certified based trust establishment scheme in Ad hoc networks [C]∥Proc of the 5th International Con-ference on New Technologies,Mobility and Security.Istanbul:IEEE,2012:1-7.
[7] ZIMMERMANN P.The Official PGP User’s Guide [M].MA:MIT Press Cambridge,1995:191-198.
[8] EISSA T,RAZAK S A,NGADI M D A.Towards providing a new lightweight authentication and encryption scheme for MANET[J].Wireless Network,2011,17:833-842.
[9] YANG K,JIA X H,ZHANG B,et al.Threshold Key Redistribution for dynamic change of authentication group in wireless mesh networks[C]∥Proc of IEEE Global Telecommunications.Miami:IEEE,2010:1151-1156.
[10] SHIN Y C,DONG M K,HUN J L,et al.Mechanism for rege-nerating CGA using threshold secret sharing in MANET[C]∥Proc of the 13th International Conference on Advanced Communication Technology.Seoul:IEEE,2012:891-895.
[11] LI X,JING Z.A Trust cluster based key management protocol for Ad hoc networks[C]∥Proc of IEEE International Workshop on Anti-counterfeiting,Security,Identification.Xiamen:IEEE,2007:371-376.
[12] YANG Y,XUE S Q,LUO M M,et al.A self-adaptive method of task allocation in clustering-based MANETs[C]∥Proc of 2010 IEEE International Conference on Network Operations and Management Symposium.Osaka:IEEE,2010:440-447.
[13] QIN N Y,FU A M,CHEN S G.Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks[J].Computer Science,2015,2(8):145-151.(in Chinese) 秦宁元,付安民,陈守国.LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议[J].计算机科学,2015,2(8):145-151.
[14] GUO P,ZHANG H,FU D S,et al.Hybrid and Lightweight Cryptography for Wireless Sensor Network[J].Computer Science,2012,39(1):14-19.(in Chinese) 郭萍,张宏,傅德胜,等.一种混合轻量型无线传感器网络公钥密码方案[J].计算机科学,2012,39(1):14-19.
[15] FENG D G,QIN Y,WANG D,et al.Research on Trust Computing Technology[J].Computer Research and Development,2011,48(8):1332-1349.(in Chinese) 冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349.
[16] LU Z.Research on OPNET Application in Wireless Network Simulation[D].Shanghai:Fudan University,2010 .(in Chinese) 陆智.OPNET在无线网络仿真中的应用研究[D].上海:复旦大学,2010.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!