Abstract
The characteristics of mobile ad hoc networks (MANETs) such as dynamic changing topology, lack of centralized management, and the vulnerability of links, have made MANETs security a real concern. It is notable that security in this area is still a challenging issue. Without having a trusted public authority, designing suitable security for this type of networking is troublesome. One of the important issues in security mechanisms which is based on RSA algorithms is the support of key-management infrastructure based on the concept of a certificate authority (CA). In this paper, we have employed the Cluster Based Routing Protocol (CBRP) as a Routing layer protocol to use unique features of the Cluster Based MANETs and to avoid traffic flooding. CBRP is a robust/scalable routing protocol for medium and large MANETs. We have also employed the cross-layering technique to reduce the number of exchanging packets and increase the speed of the network. In addition, we have introduced a new security key management mechanism based on the CA distribution in MANETs. We introduced a distributed CA mechanism based on cluster-based architecture to create a secure network that is highly adapted to the characteristics of ad hoc networks. Our experiment showed that the proposed protocol does not generate significant overhead in the network. The average energy consumption and end-to-end delay in this protocol are less than the Authentication Protocol Based on CBRP (APBC).
Similar content being viewed by others
References
Varadharajan V, Shankaran R, Hitchens M (2004) Security for cluster based ad hoc networks. Comput Commun 27: 488–501
Ge R, Crescenzo D, Fecko G, Samtani M (2005) Efficient and secure indirect-address service discovery in MANET. In: IEEE Military Communications Conference, MILCOM 2005 3:1514–1520
Xia P, Wu M, Wang K, Chen X (2008) Identity-based fully distributed certificate authority in an OLSR MANET. In: IEEE Wireless Communications, Networking and Mobile Computing (WiCOM), 2008, pp 1–4
Zhou H, Mutka MW, Ni LM (2005) Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks. In: IEEE GLOBCOM Conference, pp 1681–1685
Zefreh MS, Fanian A, Sajadieh SM, Berenjkoub M, Khadivi P (2008) A distributed certificate authority and key establishment protocol for mobile ad hoc networks. In: IEEE ICACT 2008, pp 1157–1162
Hahn G, Nyang D, Song J, Lee J-I, Park B (2004) Secure cluster based routing protocol incorporating the distributed PKI mechanisms. In: IEEE MELECON 2004, pp 787–790
Shamir A (1979) How to share a secret. Commun ACM 22: 612–613
Desmedt Y, Frankel Y (1989) Threshold cryptosystems. Lecture notes in computer science & Crypto 89 435: 307–315
Lee K-H, Suh H-S, Han S-B, Lee S, Hwang C-S (2004) An authentication protocol based on CBRP in ad hoc network. In: The 6th international conference on advanced communication technology, pp 407–412
Chiang WLC-C, Wu H-K, Gerla M (1997) Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. In: IEEE SICON Conference, pp 197–211
Boukerche A (2002) Simulation-based performance comparison of routing protocols for mobile ad hoc networks. Simulation 78: 7
Perkins CE, Royer EM, Das SR, Marina MK (2001) Performance comparison of two on-demand routing protocols for ad hoc networks. Pers Commun IEEE 7: 116–129
Moghim N, Hendessi F, Movehhedinia N, Gulliver TA (2003) Ad-Hoc wireless network routing protocols and improved AODV. Arab J Sci Eng 28: 99–114
Abolhasan M, Wysocki T, Dutkiewicz E, Liu C, Kaiser J (2004) A review of routing protocols for mobile ad hoc networks. Ad hoc Netw 2: 1–22
Jiang M, Li J, Tay YC (1999) Cluster based routing protocol(CBRP) (INTERNET-DRAFT draft-ietf-manet-cbrp-spec-01.txt). In: National University of Singapore, I. E. T. F. (IETF), Ed., pp 1–27
Liu C, Kaiser J (2003) A survey of mobile ad hoc network routing protocols. Technical report series No. 2003–2008
NS-2 (2008) Network simulator 2 (NS2). http://www.isi.edu/nsnam/ns/
Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001, pp 1548–1557
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hosseini Seno, S.A., Budiarto, R. & Wan, TC. A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority. Arab J Sci Eng 36, 245–257 (2011). https://doi.org/10.1007/s13369-010-0018-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-010-0018-4