Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure communications for cluster-based ad hoc networks using node identities
Lee J., Chang C. Journal of Network and Computer Applications30 (4):1377-1396,2007.Type:Article
Date Reviewed: May 1 2008

One of the important challenges in ad hoc mobile networking is providing secure communication among participants. This paper proposes a protocol based on node identities (ID) to establish such a secure environment. The advantage of this protocol is reduced overhead for key computations, compared to the mechanism proposed in 2004 by Varadharajan et al. [1]. Varadharajan’s mechanism uses a public key infrastructure (PKI) cryptosystem, which is an asymmetric cryptosystem; thus, the computational cost is high. In a mobile environment, this can represent significant power consumption.

Lee and Chang propose an authentication system using symmetric key computation, which is much faster than the PKI system. The key computation and distribution overhead can be reduced by 21 percent in the authentication phase and 25 percent in the communication phase. The ID-based mechanism achieves these savings by using a trusted authority to distribute the secret information (public key) to each involved node, avoiding one round of negotiations between the cluster head and the mobile node.

While the ID-based mechanism reduces the computation overhead in authentication and communication, it assumes the existence of a trusted authority for generating and issuing the secret information for all parties involved--cluster heads and mobile nodes. The validity of this assumption and its impact in practice were not carefully examined in the paper. Nevertheless, the computational savings are significant and the ID-based mechanism can have an impact on ad hoc mobile networking.

Reviewer:  Xiannong Meng Review #: CR135547 (0903-0255)
1) Varadharajan, V.; Shankaran, R.; Hitchens, M. Security for cluster based ad hoc networks. Computer Communications 27, 5(2004), 488–501.
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Routing Protocols (C.2.2 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Network Protocols (C.2.2 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy