In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.
History
Event
International Conference on Computer and Information Science (6th : 2007 : Melbourne, Australia)
Pagination
682 - 687
Publisher
IEEE Computer Society
Location
Melbourne, Australia
Place of publication
Los Alamitos, Calif.
Start date
2007-07-11
End date
2007-07-13
ISBN-13
9780769528410
ISBN-10
0769528414
Language
eng
Publication classification
E1 Full written paper - refereed
Copyright notice
2007, IEEE
Editor/Contributor(s)
R Lee, M Chowdhury, S Ray, T Lee
Title of proceedings
6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings