Skip to main content
Log in

A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority

  • Research Article – Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The characteristics of mobile ad hoc networks (MANETs) such as dynamic changing topology, lack of centralized management, and the vulnerability of links, have made MANETs security a real concern. It is notable that security in this area is still a challenging issue. Without having a trusted public authority, designing suitable security for this type of networking is troublesome. One of the important issues in security mechanisms which is based on RSA algorithms is the support of key-management infrastructure based on the concept of a certificate authority (CA). In this paper, we have employed the Cluster Based Routing Protocol (CBRP) as a Routing layer protocol to use unique features of the Cluster Based MANETs and to avoid traffic flooding. CBRP is a robust/scalable routing protocol for medium and large MANETs. We have also employed the cross-layering technique to reduce the number of exchanging packets and increase the speed of the network. In addition, we have introduced a new security key management mechanism based on the CA distribution in MANETs. We introduced a distributed CA mechanism based on cluster-based architecture to create a secure network that is highly adapted to the characteristics of ad hoc networks. Our experiment showed that the proposed protocol does not generate significant overhead in the network. The average energy consumption and end-to-end delay in this protocol are less than the Authentication Protocol Based on CBRP (APBC).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Varadharajan V, Shankaran R, Hitchens M (2004) Security for cluster based ad hoc networks. Comput Commun 27: 488–501

    Article  Google Scholar 

  2. Ge R, Crescenzo D, Fecko G, Samtani M (2005) Efficient and secure indirect-address service discovery in MANET. In: IEEE Military Communications Conference, MILCOM 2005 3:1514–1520

  3. Xia P, Wu M, Wang K, Chen X (2008) Identity-based fully distributed certificate authority in an OLSR MANET. In: IEEE Wireless Communications, Networking and Mobile Computing (WiCOM), 2008, pp 1–4

  4. Zhou H, Mutka MW, Ni LM (2005) Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks. In: IEEE GLOBCOM Conference, pp 1681–1685

  5. Zefreh MS, Fanian A, Sajadieh SM, Berenjkoub M, Khadivi P (2008) A distributed certificate authority and key establishment protocol for mobile ad hoc networks. In: IEEE ICACT 2008, pp 1157–1162

  6. Hahn G, Nyang D, Song J, Lee J-I, Park B (2004) Secure cluster based routing protocol incorporating the distributed PKI mechanisms. In: IEEE MELECON 2004, pp 787–790

  7. Shamir A (1979) How to share a secret. Commun ACM 22: 612–613

    Article  MATH  MathSciNet  Google Scholar 

  8. Desmedt Y, Frankel Y (1989) Threshold cryptosystems. Lecture notes in computer science & Crypto 89 435: 307–315

    Article  Google Scholar 

  9. Lee K-H, Suh H-S, Han S-B, Lee S, Hwang C-S (2004) An authentication protocol based on CBRP in ad hoc network. In: The 6th international conference on advanced communication technology, pp 407–412

  10. Chiang WLC-C, Wu H-K, Gerla M (1997) Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. In: IEEE SICON Conference, pp 197–211

  11. Boukerche A (2002) Simulation-based performance comparison of routing protocols for mobile ad hoc networks. Simulation 78: 7

    Article  Google Scholar 

  12. Perkins CE, Royer EM, Das SR, Marina MK (2001) Performance comparison of two on-demand routing protocols for ad hoc networks. Pers Commun IEEE 7: 116–129

    Google Scholar 

  13. Moghim N, Hendessi F, Movehhedinia N, Gulliver TA (2003) Ad-Hoc wireless network routing protocols and improved AODV. Arab J Sci Eng 28: 99–114

    Google Scholar 

  14. Abolhasan M, Wysocki T, Dutkiewicz E, Liu C, Kaiser J (2004) A review of routing protocols for mobile ad hoc networks. Ad hoc Netw 2: 1–22

    Article  Google Scholar 

  15. Jiang M, Li J, Tay YC (1999) Cluster based routing protocol(CBRP) (INTERNET-DRAFT draft-ietf-manet-cbrp-spec-01.txt). In: National University of Singapore, I. E. T. F. (IETF), Ed., pp 1–27

  16. Liu C, Kaiser J (2003) A survey of mobile ad hoc network routing protocols. Technical report series No. 2003–2008

  17. NS-2 (2008) Network simulator 2 (NS2). http://www.isi.edu/nsnam/ns/

  18. Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001, pp 1548–1557

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seyed Amin Hosseini Seno.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hosseini Seno, S.A., Budiarto, R. & Wan, TC. A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority. Arab J Sci Eng 36, 245–257 (2011). https://doi.org/10.1007/s13369-010-0018-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-010-0018-4

Keywords

Navigation