A Distributed Security Architecture for Ad hoc Networks

Ratan Guha, Mainak Chatterjee, Jaideep Sarkar

2005

Abstract

Secure communication in ad hoc networks is an inherent problem because of the distributiveness of the nodes and the reliance on cooperation between the nodes. All the nodes in such networks rely and trust other nodes for forwarding packets because of their limitation in the range of transmission. Due to the absence of any central administrative node, verification of authenticity of nodes is very difficult. In this paper, we propose a clusterhead-based distributed security mechanism for securing the routes and communication in ad hoc networks. The clusterheads act as certificate agencies and distribute certificates to the communicating nodes, thereby making the communication secure. The clusterheads execute administrative functions and hold shares of network keys that are used for communication by the nodes in respective clusters. Due to the process of authentication, there are signalling and message overheads. Through simulation studies, we show how the presence of clusterheads can substantially reduce these overheads and still maintain secure communication.

References

  1. S. Basagni, I. Chlamtac, and A. Farago, “A Generalized Clustering Algorithm for Peerto-Peer Networks”, Proceedings of Workshop on Algorithmic Aspects of Communication (satellite workshop of ICALP), July 1997.
  2. M. Bechler, H. J Hof, D. Kraft, F. Pahlke, L. Wolf “A Cluster Based Security Architecture for Ad Hoc Networks,” IEEE Infocom 2004.
  3. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “ARIADNE: A Secure On-Demand Routing Protocol for Ad Hoc Networks” Mobicom, Sept. 2002 ACM.
  4. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks.” Technical Report, Department of Computer Science, Rice University, December 2001.
  5. Y. Desmedt and S. Jajodia, “Redistributing secret shares to new structures and its applications,” George Mason Univ., Tech Report., 1997.
  6. D.B Johnson, D.A Maltz and Y.C Hu, “The Dynamic Source Routing in ad hoc wireless Networks,” Imielinski and Korth, editors, Mobile Computing volume 353, Kluwer Academic Publishers, 1996.
  7. J. Kong, P. Zerfos, H. Luo, S. Lu adn L.Zhang, “Providing robust and ubiquitious security support for mobile ad-hoc networks,” in Proc. 9th International Conference on Network Protocols (ICNP). Riverside, California: IEEE, Nov. 2001, pp 251-261.
  8. F.G Nocetti, J.S Gonzalez, I. Stojmenovic, “Connectivity based k-hop clustering in wireless networks,” Telecommunications Systems 18 (2001) 1-3, 155-168.
  9. T. Pedersen, “A threshold cryptosystem without a trusted party,” in Advances in Cryptology, Proc. Eurocrypt'91, ser. LNCS, vol 547. Springer-Verlag 1991.
  10. A. Shamir, “How to share a secret,” ACM Comm., Vol 22, no. 11, 1979.
  11. W. Stallings, “Cryptography and Network Security : Principles and Practices”, 3rd edition, Prentice Hall
  12. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp 24-30, 1999.
  13. L. Zhou, F. B Schneider, and R. van Renesse, “COCA: A secure distributed on-line certification authority,” ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002.
Download


Paper Citation


in Harvard Style

Guha R., Chatterjee M. and Sarkar J. (2005). A Distributed Security Architecture for Ad hoc Networks . In Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005) ISBN 972-8865-21-X, pages 81-91. DOI: 10.5220/0002570800810091


in Bibtex Style

@conference{wis05,
author={Ratan Guha and Mainak Chatterjee and Jaideep Sarkar},
title={A Distributed Security Architecture for Ad hoc Networks},
booktitle={Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)},
year={2005},
pages={81-91},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002570800810091},
isbn={972-8865-21-X},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)
TI - A Distributed Security Architecture for Ad hoc Networks
SN - 972-8865-21-X
AU - Guha R.
AU - Chatterjee M.
AU - Sarkar J.
PY - 2005
SP - 81
EP - 91
DO - 10.5220/0002570800810091