of hops averages out as the caching reduces the overhead. So even if there are sudden
increases in the overhead, the average is considerably lower.
5 Conclusion
With ad hoc networks becoming increasing popular, securing communication in such
networks is gaining importance. Securing ad hoc networks is more challenging because
of the absence of an central authority and the distributiveness of the nodes. In this paper,
we propose a clusterhead based distributed authentication mechanism. The clusterheads
execute administrative functions and act as certificate agencies and distribute certificates
to the communicating nodes, thereby making the communication secure. Simulation
experiments were conducted to study the message overhead that would be incurred due
to the process of authentication. The use of cache to store public keys has shown to
better the performance in the long run.
References
1. S. Basagni, I. Chlamtac, and A. Farago, “A Generalized Clustering Algorithm for Peer-
to-Peer Networks”, Proceedings of Workshop on Algorithmic Aspects of Communication
(satellite workshop of ICALP), July 1997.
2. M. Bechler, H. J Hof, D. Kraft, F. Pahlke, L. Wolf “A Cluster Based Security Architecture
for Ad Hoc Networks,” IEEE Infocom 2004.
3. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “ARIADNE: A Secure On-Demand
Routing Protocol for Ad Hoc Networks” Mobicom, Sept. 2002 ACM.
4. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Packet Leashes: A Defense against
Wormhole Attacks in Wireless Ad Hoc Networks.” Technical Report, Department of Com-
puter Science, Rice University, December 2001.
5. Y. Desmedt and S. Jajodia, “Redistributing secret shares to new structures and its applica-
tions,” George Mason Univ., Tech Report., 1997.
6. D.B Johnson, D.A Maltz and Y.C Hu, “The Dynamic Source Routing in ad hoc wireless
Networks,” Imielinski and Korth, editors, Mobile Computing volume 353, Kluwer Academic
Publishers, 1996.
7. J. Kong, P. Zerfos, H. Luo, S. Lu adn L.Zhang, “Providing robust and ubiquitious security
support for mobile ad-hoc networks,” in Proc. 9th International Conference on Network Pro-
tocols (ICNP). Riverside, California: IEEE, Nov. 2001, pp 251-261.
8. F.G Nocetti, J.S Gonzalez, I. Stojmenovic, “Connectivity based k-hop clustering in wireless
networks,” Telecommunications Systems 18 (2001) 1-3, 155-168.
9. T. Pedersen, “A threshold cryptosystem without a trusted party,” in Advances in Cryptology,
Proc. Eurocrypt’91, ser. LNCS, vol 547. Springer-Verlag 1991.
10. A. Shamir, “How to share a secret,” ACM Comm., Vol 22, no. 11, 1979.
11. W. Stallings, “Cryptography and Network Security : Principles and Practices”, 3rd edition,
Prentice Hall
12. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp 24-30,
1999.
13. L. Zhou, F. B Schneider, and R. van Renesse, “COCA: A secure distributed on-line certifi-
cation authority,” ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002.
91