Automatic Node Configuration Protocol Using Modified CGA in Hierarchical MANETs

  • Hyewon K. Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3991)


The CGA is designed to prevent address spoofing and stealing and to provide digital signature to users without any help from security infrastructures, but fake key generation and address collision appear in flat-tiered network. To solve these problems, CGA defines security parameter (SEC), which is set to high value when high security is required. Although CGA with high SEC makes attackers be difficult to find fake key, it brings an alarming increase in processing time to generate CGA. On the contrary, the probability to find a fake key is high if low SEC is applied to CGA. In this paper, MCGA applicable to as well public networks as ad-hoc networks is proposed. Address collision problems are settled by employing hierarchy. Using MCGA, no previous setup is required before communication, and automatic node configuration is feasible.


Average Execution Time Public Network Security Infrastructure Collision Count Node Configuration 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Nesargi, S., Prakash, R.: MANETconf: Configuration of Hosts in a Mobile ad Hoc Network. In: INFOCOM. IEEE, Los Alamitos (2002)Google Scholar
  2. 2.
    Lee, H., Mun, Y.: Node Configuration Protocol based on Hierarchical Network Architecture for Mobile Ad-Hoc networks. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol. 3090, pp. 3–12. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Zhou, H., Ni, L., Mutka, M.: Prophet Address Allocation for Large Scale MANET. In: INFOCOM. IEEE, Los Alamitos (2003)Google Scholar
  4. 4.
    Aura, T.: Cryptographically Generated Address. RFC 3972, IETF (2005)Google Scholar
  5. 5.
    Moore, N.: Optimistic DAD for IPv6. work in progress, IETF (2004)Google Scholar
  6. 6.
    Kulik, J., Heinzelman, W., Balakrishnann, H.: Negotiation-Based Protocols for Disseminationg Information in Wireless Sensor Networks (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyewon K. Lee
    • 1
  1. 1.School of ComputingSoongsil UniversitySeoulKorea

Personalised recommendations