Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking

이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구

  • 박배효 (한국정보보호진흥원 전자거래보호단) ;
  • 이재일 (한국정보보호진흥원 전자거래보호단) ;
  • 한진백 (연세대학교 컴퓨터과학과) ;
  • 양대헌 (인하대학교 정보통신대학원)
  • Published : 2004.11.30

Abstract

A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Keywords

References

  1. G. Hahn, D. Nyang, J. Song, J. Lee, B. Park, Securing Cluster Based Routing Protocol Incorporating the Distributed PKI Mechanisms, Melecon2004, May 2004
  2. 권혜연, 신재욱, 이병복, 최지혁, 남상우, 'Ad Hoc 통신망 프로토콜 개발동향', ‘Telecommunication Review’, 제12권, 제3호 (May-June, 2002)
  3. 권혜연, 신재욱, 이병복, 최지혁, 남상우, '이동 Ad Hoc 네트워크 기술 동향', '전자통신동향분석', 제18권, 제2호 (2003)
  4. L. Zhou and Z. Bass, Securingad hoc networks, IEEE Network, 1999
  5. M.S. Corson and J.P. Macker, Mobile Ad hoc Networking (MANET) : Routing Protocol Performance Issues and Evaluation Considerations, IETF RFC 2501, Jan., 1999
  6. Adi Shamir, 'How to share a secret,' Communications of the ACM, Vol.22 (1979), pp.612-613
  7. J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, 'Providing Robust and Ubiquitous Security Supports for Mobile Ad Hoc Networks,' IEEE Proc. ICNP(2001), pp.251-260