Mobile Ad Hoc Network에서 이동 노드에 대한 효율적인 인증 메커니즘

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network

  • Lee Yong (School of Electrical Eng. Cornell University)
  • 발행 : 2005.11.01

초록

Mobile Ad Hoc Networks (MANETs)은 기존의 기반구조에 의존하지 않고 자치적으로 구성${\cdot}$운영되는 네트워크이다. 다른 네트워크 토폴로지에서처럼, 보완은 MANET의 사용 확산에 중요한 요소이며, 특히 노드들의 구성이 자주 빠르게 변하고, 기존의 기반구조에 대한 접속이 불가능한 MANET에서 이러한 특성을 지원하는 보안 프로토콜의 개발이 중요하다. 유선의 기반구조를 적용한 네트워크에서 이미 개발되어 사용 중인 신뢰 모델과 인증 프로토콜은 MANET에서 사용될 수 없다. 이 논문에서는 아주 넓은 지역에 걸쳐 분포된 이동 사용자에게 효율적인 인증 문제를 주제로 주목하고, 위와 같은 MANET 환경에 맞는 새로운 인증 방법을 제안한다. 제안된 방법은 노드들에게 CA(Certification Authority)의 기능을 분산시키고 CA이 기능이 구현된 노드들 사이에 인증 정보를 효율적으로 공유하기 위해 randomized group을 사용한다. 또한 randomized group을 적용한 인증 메커니즘의 성능을 평가한다.

Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.

키워드

참고문헌

  1. Seun Yi and Robin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU -ENG-2002-1717, University of Illinois at Urbana- Champaign, May 2002
  2. Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, 'Self-securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002
  3. Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactionson Mobile Computing, Vol. 2, No. 1, pp. 52-64. Jan-Mar 2003 https://doi.org/10.1109/TMC.2003.1195151
  4. Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, January 2003
  5. Lidong Zhou and Zygmunt J. Haas, 'Securing Ad hoc network,' IEEE Network Magazine, pp. 24 -30, Nov/Dec 1999 https://doi.org/10.1109/65.806983
  6. Zygmunt J. Haas and Ben Liang, 'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999 https://doi.org/10.1109/90.769770
  7. Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June 1999 https://doi.org/10.1109/ICC.1999.765546
  8. J. Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications (ICC) 2003, Anchorage, May 2003 https://doi.org/10.1109/ICC.2003.1204191
  9. Tracy Camp, Jegg Boleng and Vanessa Davies, 'A Survey of Mobility Models for Ad Hoc Networks Research,' Wireless Communication and Mobile Computing (WCMC), vol. 2, no. 5, pp. 483-502, 2002 https://doi.org/10.1002/wcm.72
  10. Ben Liang and Zygmunt J. Haas, 'Virtual Backbone Generation and Maintenance in Ad Hoc Mobility Management,' IEEE INFOCOM'2000, Tel Aviv, Israel, March, 2000 https://doi.org/10.1109/INFCOM.2000.832522