DOI QR코드

DOI QR Code

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET

MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2017.08.16
  • Accepted : 2017.09.07
  • Published : 2017.09.30

Abstract

MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Keywords

References

  1. S. Maity, R. Hansdah, "Self-organized public key management in manets with enhanced security and without certificate-chains," Comput. Networks, 2014, pp. 183-211.
  2. H. Rifa-Pous, J., Computational and energy costs of cryptographic algorithms on handheld devices," in: Future Internet, Vol. 3, 2011, pp. 31-48. https://doi.org/10.3390/fi3010031
  3. 정관수, "Interactive Multipath Routing Protocol for Improving the Routing Performance in Wireless Sensor Networks," 디지털산업정보학회지, 제11권, 제3호, 2015, pp. 79-90.
  4. 차시호, 이종언, 류민우, "차량의 이동 방향과 거리 기반의 그리디 애니캐스트 포워딩 프로토콜," 디지털산업정보학회지, 제13권, 제1호, 2017, pp. 79-85.
  5. K. Hamouid, K. Adi, "Self-certified based trust establishment scheme in ad-hoc networks," 5th IFIP International Conference on New Technologies, Mobility and Security, NTMS, IEEE 2012, pp. 1-7.
  6. M. Devi, S.C. Pandian, "An efficient autonomous key management with reduced communication computation costs in mobile ad hoc network," J. Comput. Sci., Vol. 9, No. 10, 2013, pp. 1260-1266. https://doi.org/10.3844/jcssp.2013.1260.1266
  7. P. Memarmoshrefi, R. Seibel, D. Hogrefe, "Bio-inspired self-organized public key authentication mechanism for mobile ad-hoc networks," Lect. Notes Inst. Comput. Sci., Soc. Inform. Telecommun. Eng., Vol. 87, 2012, pp. 375-386.
  8. 김정삼, "무선 센서네트워크에서 네트워크수명 극대화 방안," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 47-59.
  9. P.B. Velloso, R.P. Laufer, D. Cunha, O.C.M.B. Duarte, G. Pujolle, "Trust management in mobile ad hoc networks using a scalable maturity-based model," IEEE Transactions on Network and Service Management, Vol. 7, No. 3, 2010, pp. 172-185. https://doi.org/10.1109/TNSM.2010.1009.I9P0339
  10. 왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.
  11. F. Bao, I.R. Chen, M. Chang, J.H. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Transactions on Network and Service Management, Vol. 9, No. 2, 2012, pp. 169-183. https://doi.org/10.1109/TCOMM.2012.031912.110179
  12. P. Nyeung, J. Ostergaard, "Information and communications systems for control-by-price of distributed energy resources and flexible demand," IEEE Transactions on Smart Grid, Vol. 2, No. 2, 2011, pp. 334-341. https://doi.org/10.1109/TSG.2011.2116811

Cited by

  1. 퍼지추출 기술을 활용한 스마트 카드 기반 패스워드 인증 스킴 vol.14, pp.4, 2017, https://doi.org/10.17662/ksdim.2018.14.4.125