SLID: A secure lowest-ID clustering algorithm

EDP Sciences - Tập 10 - Trang 39-42 - 2005
Hu Guang-ming1, Huang Zun-guo1, Hu Hua-ping1, Gong Zheng-hu1
1School of Computer Science, National University of Defense Technology, Changsha, China

Tóm tắt

In order to solve security problem of clustering algorithm, we proposed a method to enhance the security of the well-known lowest-ID clustering algorithm. This method is based on the idea of the secret sharing and the (k, n) threshold cryptography. Each node, whether clusterhead or ordinary member, holds a share of the global certificate, and anyk nodes can communicate securely. There is no need for any clusterhead to execute extra functions more than routing. Our scheme needs some prior configuration before deployment, and can be used in critical environment with small scale. The security-enhancement for Lowest-ID algorithm can also be applied into other clustering approaches with minor modification. The feasibility of this method was verified by the simulation results.

Tài liệu tham khảo

Gerla M, Tsai Tzu-chieh. Multicluster Mobile, Multimedia Radio Network.Wireless Networks, 1995,1: 255–265. Chiang Ching-chuan, Gerla M. Routing and Multicast in Multihop, Mobile Wireless Networks.IEEE International Conference on Universal Personal Communications (ICUPC' 97). San Diego, California: IEEE Press, 1997. 546. <http://www.ccit.edu.tw/≈ccchiang/publications.html.> Chatterjee M, Das SK, Turgut D. WCA: A Weighted Clustering Algorithm for Mobile Ad hoc Networks,Journal of Clustering Computing IEEE, 2002,5(2): 193–204. Basagni S, Herrin K, Rosti E,et al. Secure Pebblenets.Proceedings of the 2001 ACM International Symposium on Mobile ad Hoc Networking and Computing, Long Beach. California: ACM Press, 2001. 156. Zhou L, Haas Z J. Securing Ad Hoc Networks.IEEE Networks. 1999,13(6): 24–30. Bechler M, Hof H J, Kraft D,et al. A Cluster-Based Security Architecture for Ad Hoc Networks.Proceedings of the 23rd IEEE Infocom 2004, Hong Kong: IEEE Press, 2004. 501. Shamir A. How to Share a Secret.ACM Comm, 1979,22 (11): 612–613. Sanzgiri K, Dahill B, Levine B N,et al. A Secure Routing Protocol for Ad Hoc Networks.Proceedings of the International Conference on Network Protocols (ICNP). Paris: IEEE Press, 2002, 78. Capkun S, Buttyan L, Hubaux J P. Self-Organized Publickey Management for Mobile Ad Hoc Networks.IEEE Transactions on Mobile Computing, 2003,2(1): 52–64. Kuang Xiao-hui.Research of Group Key Management in Mobile Ad Hoc Networks [Ph. D Thesis]. Changsha: National University of Defense Technology, 2003. Kong Jie-jun, Zerfos P, Lui Hai-yun,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks.9th IEEE International Conference on Network Protocols (ICNP'01), Riverside, CA: IEEE Press, 2001. 251.