JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on Routing Performance Improvement through Cooperation Authentication Technique
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Routing Performance Improvement through Cooperation Authentication Technique
Yang, Hwanseok;
  PDF(new window)
 Abstract
The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.
 Keywords
Cooperation Authentication;Trust Evaluation;Authentication Technique;MANET;
 Language
Korean
 Cited by
 References
1.
J. Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks," Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp. 476-481.

2.
J. Sen, P. R. Chowdhury, I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.

3.
K. Naik (Joshi), A. Dixit, "Resource Aware Node Authentication Framework for Secure MANET," IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, 2014, pp. 109-113.

4.
왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.

5.
M. K. Rafsanjani, A. Movaghar, "Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks," World Applied Sciences Journal, Vol. 4, No. 3, 2008, pp. 444-449.

6.
Kush, A., Hwang, C., Gupta, P., "Secured Routing Scheme for Adhoc Networks," International Journal of Computer Theory and Engineering (IJCTE) 3, Vol. 60, No. 1, 2013, pp. 1089-1098.

7.
P. Singh, M. Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks," International Conference on Recent Trends in Engineering and Technology, 2012.

8.
왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.

9.
Gomathi, S., Duraiswamy, K., "Guaranteed Packet Transfer in MANET", In and Out of Coverage Areas and Energy Saving Using Random Casting (IJCSE) International Journal on Computer Science and Engineering 02(03), 2010, pp. 865-869.

10.
J. Sen, P. R. Chowdhury, and I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.

11.
M. Cagalj, S. Capkun, and J. P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," Proceedings of IEEE, Special Issue on Security and Cryptography, Vol. 94, No. 2, 2006, pp. 467-478.