Automatic Node Configuration Protocol Using Modified CGA in Hierarchical MANETs
The CGA is designed to prevent address spoofing and stealing and to provide digital signature to users without any help from security infrastructures, but fake key generation and address collision appear in flat-tiered network. To solve these problems, CGA defines security parameter (SEC), which is set to high value when high security is required. Although CGA with high SEC makes attackers be difficult to find fake key, it brings an alarming increase in processing time to generate CGA. On the contrary, the probability to find a fake key is high if low SEC is applied to CGA. In this paper, MCGA applicable to as well public networks as ad-hoc networks is proposed. Address collision problems are settled by employing hierarchy. Using MCGA, no previous setup is required before communication, and automatic node configuration is feasible.
KeywordsAverage Execution Time Public Network Security Infrastructure Collision Count Node Configuration
- 1.Nesargi, S., Prakash, R.: MANETconf: Configuration of Hosts in a Mobile ad Hoc Network. In: INFOCOM. IEEE, Los Alamitos (2002)Google Scholar
- 3.Zhou, H., Ni, L., Mutka, M.: Prophet Address Allocation for Large Scale MANET. In: INFOCOM. IEEE, Los Alamitos (2003)Google Scholar
- 4.Aura, T.: Cryptographically Generated Address. RFC 3972, IETF (2005)Google Scholar
- 5.Moore, N.: Optimistic DAD for IPv6. work in progress, IETF (2004)Google Scholar
- 6.Kulik, J., Heinzelman, W., Balakrishnann, H.: Negotiation-Based Protocols for Disseminationg Information in Wireless Sensor Networks (2002)Google Scholar