Advanced SearchSearch Tips
A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique
Yang, Hwanseok;
  PDF(new window)
MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.
Authentication Technique;Secure Routing;Trust Measurement;MANET;
 Cited by
Aarti and S. S. Tyagi, "Study of MANET : Characteristics, Challenges, Application and Security Attacks," International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 5, 2013, pp. 252-257.

A. K. Gupta, H. Sadawati and A. K. Verma, "Review of various routing protocols for MANETs," International Journal of Information and Electronics Engineering, Vol. 1, No. 3, 2011, pp. 251-259.

Shaveta, P. Singh and R. Preet, "Reviewing MANETs & Configuration of Certificate Authority(CA) for node Authentication," IJCSIT, Vol. 4, No. 6, 2013, pp.974-978.

S. Mishra and N. Mod, "GSM Mobile Authentication Based on User SIM," IJCST, Vol. 2, Issue 6, 2014, pp. 121-125.

P. Papadimitratos and Z. J. Haas, "Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50.

Jin-Hee Cho, Ananthram Swami and Ing-Ray Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks for Mobile Ad-Hoc Networks," IEEE Communication Surveys & Tutorials, Vol. 13, No. 4, 2011, pp. 562-583. crossref(new window)

S. Dabideen, B. R. Smith and J. J. Garcia-Luna-Aceves, "An End-to-End Solution for Secure and Survivable Routing in MANETs," 7th International Workshop on Design of Reliable Communication Networks, Washington DC, 25-28 October 2009, pp. 183-190.

왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.

Roopaligarg and Himika Sharma, "Comparison between Sybil Attack Detection Technique: Lightweight and Robust," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, issue 2, 2014, pp. 7142-7147.

양환석, "Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구," 디지털산업정보학회지, 제10권, 제3호, 2014, pp. 161-169.