14-11-2012, 02:29 PM
ACS: An Efficient Address based Cryptography Scheme for Mobile Ad Hoc
Networks Security
1ACS An Efficient Address.pdf (Size: 607.03 KB / Downloads: 37)
Abstract
Providing security support for Mobile ad hoc
networks (MANETs) is challenging task.
Masquerading and eavesdropping are major threats to
the security of wireless communications and mobile
networks. The scheme proposed in this paper describes
the framework to solve the security threats by
designing a address based cryptography scheme. An
Address-based Cryptography Scheme (ACS) as a
combination of Ad hoc node address and public key
cryptography. ACS is a certificateless public key
cryptography solution in that public keys of mobile
nodes are directly derivable from their known Ad hoc
node address plus some common information. Thus, it
eliminates the need for certificate-based authenticated
public-key distribution essential in conventional
public-key management schemes. ACS is an efficient
construction method of address-based public/private
keys cryptography, which not only ensures high-level
authentication to node exchange information, but also
enables efficient network-wide secure key update via a
single broadcast message.
INTRODUCTION
A mobile ad hoc network (MANETs) is a group of
mobile and wireless devices which communicates
between them without the assistance of any
infrastructure. The network is self-organized and is
adaptive to topology changes arising from either
mobility or link outages. The participating network
nodes are equipped with radios that have limited
communication range. In order to communicate with
nodes outside their direct wireless transmission range,
nodes forward packets for other nodes, resulting in
multi-hop routes. The lack of infrastructure, shared
wireless medium, node mobility, resource constraints
of mobile devices, bandwidth-limited and error-prone
channels and so on. In this proposed scheme it deals
with public/private key management, the foundation on
which to drive the address based cryptography
mechanism for MANETs security.
ADDRESS BASED CRYPTOGRAPHY SCHEME
(ACS)
In this section, illustrate the method of ACS. ACS
uses the node address with certificateless cryptography
to give the end to end authentication. Route invention
in ACS is based on route invention packet from source
node and route reply packet from destination node. The
route packets are encrypted based on ACS. Only
authorized nodes participate at each hop between
source and the destination. Assume key generation is
known by all authorized nodes.
Key Revocation
An RSA based design, which is currently the most
prevalent public key cryptosystem. The system
generates RSA key pair is denoted by as {PuK, PrK}
where PrK is the system secret/ private key and PuK is
the system public key. PrK is used to encrypt for all the
entities in the network. A encryption by the PrK can be
verified by the well known system public key PuK.
By address based cryptography scheme PrK is
shared among nodes in the entire network. Each nodes
holds a secret key which is used decrypt the route
discovery message send by any one of nodes.
Besides the system key pair, each entity N also
maintains a personal RSA private and public key pair
{PuKN, PrKN}. This pair of personal keys is used in
end to end security to realize cipher key exchange,
message privacy, message integrity and nonrepudiation.
CONCLUSION
In this paper, ACS described a solution to security
support in mobile ad hoc network (MANETs). Our
model has been motivates by three main factors: (a)
any security system is completely unbreakable. (b) It
seeks to maximize the service availability in each
network environment: this is crucial to supporting
ubiquitous service for mobile users. © The solution
has to fully decentralize to operate in a large network.
To this end, we have addressed certificate issues
including ARAN and IBC. Our experiences in
implementation and simulations have shown positive
results for this approach ACS.