A new cluster-based secure communication scheme for mobile ad hoc networks

Fei Shi, Weijie Liu, Jooseok Song

Research output: Contribution to journalArticle

Abstract

Mobile ad hoc networks have attracted considerable interest because of their use by the military and emergency rescue personnel as well as in mining operations and vehicular networks. However, mobile ad hoc networks are more vulnerable to security attacks than other types of wireless networks, such as wireless local area network or 3G/LTE networks. As a countermeasure to attack, clustering is used, where each node must be authenticated with the corresponding clusterhead in the cluster, and all data must be encrypted. In this paper, a new clusterbased secure communication scheme is proposed in which mutual authentications are performed before data transmission. In contrast to conventional schemes that use public key infrastructure cryptosystems, resulting in serious overheads in terms of computation and communication, our authentication process uses a station-to-station protocol, which is in itself an extended version of the Diffie-Hellman key exchange protocol to establish authenticated context. Moreover, attacks like replay attacks and man-in-themiddle attacks can be prevented by additional security mechanisms in the authentication and communication processes such as hash-function message authentication codes. Our proposed scheme not only meets all the security requirements, but also supports efficient communication. Performance analysis demonstrates the superiority of our scheme to related schemes.

Original languageEnglish
Pages (from-to)1127-1138
Number of pages12
JournalJournal of Internet Technology
Volume18
Issue number5
DOIs
Publication statusPublished - 2017 Jan 1

Fingerprint

Mobile ad hoc networks
Authentication
Communication
Network protocols
Hash functions
Wireless local area networks (WLAN)
Data communication systems
Cryptography
Wireless networks
Personnel
Secure communication

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Cite this

@article{f4942be9c0144b218ff595ab658a65a4,
title = "A new cluster-based secure communication scheme for mobile ad hoc networks",
abstract = "Mobile ad hoc networks have attracted considerable interest because of their use by the military and emergency rescue personnel as well as in mining operations and vehicular networks. However, mobile ad hoc networks are more vulnerable to security attacks than other types of wireless networks, such as wireless local area network or 3G/LTE networks. As a countermeasure to attack, clustering is used, where each node must be authenticated with the corresponding clusterhead in the cluster, and all data must be encrypted. In this paper, a new clusterbased secure communication scheme is proposed in which mutual authentications are performed before data transmission. In contrast to conventional schemes that use public key infrastructure cryptosystems, resulting in serious overheads in terms of computation and communication, our authentication process uses a station-to-station protocol, which is in itself an extended version of the Diffie-Hellman key exchange protocol to establish authenticated context. Moreover, attacks like replay attacks and man-in-themiddle attacks can be prevented by additional security mechanisms in the authentication and communication processes such as hash-function message authentication codes. Our proposed scheme not only meets all the security requirements, but also supports efficient communication. Performance analysis demonstrates the superiority of our scheme to related schemes.",
author = "Fei Shi and Weijie Liu and Jooseok Song",
year = "2017",
month = "1",
day = "1",
doi = "10.6138/JIT.2017.18.5.20130514",
language = "English",
volume = "18",
pages = "1127--1138",
journal = "Journal of Internet Technology",
issn = "1607-9264",
publisher = "Taiwan Academic Network Management Committee",
number = "5",

}

A new cluster-based secure communication scheme for mobile ad hoc networks. / Shi, Fei; Liu, Weijie; Song, Jooseok.

In: Journal of Internet Technology, Vol. 18, No. 5, 01.01.2017, p. 1127-1138.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A new cluster-based secure communication scheme for mobile ad hoc networks

AU - Shi, Fei

AU - Liu, Weijie

AU - Song, Jooseok

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Mobile ad hoc networks have attracted considerable interest because of their use by the military and emergency rescue personnel as well as in mining operations and vehicular networks. However, mobile ad hoc networks are more vulnerable to security attacks than other types of wireless networks, such as wireless local area network or 3G/LTE networks. As a countermeasure to attack, clustering is used, where each node must be authenticated with the corresponding clusterhead in the cluster, and all data must be encrypted. In this paper, a new clusterbased secure communication scheme is proposed in which mutual authentications are performed before data transmission. In contrast to conventional schemes that use public key infrastructure cryptosystems, resulting in serious overheads in terms of computation and communication, our authentication process uses a station-to-station protocol, which is in itself an extended version of the Diffie-Hellman key exchange protocol to establish authenticated context. Moreover, attacks like replay attacks and man-in-themiddle attacks can be prevented by additional security mechanisms in the authentication and communication processes such as hash-function message authentication codes. Our proposed scheme not only meets all the security requirements, but also supports efficient communication. Performance analysis demonstrates the superiority of our scheme to related schemes.

AB - Mobile ad hoc networks have attracted considerable interest because of their use by the military and emergency rescue personnel as well as in mining operations and vehicular networks. However, mobile ad hoc networks are more vulnerable to security attacks than other types of wireless networks, such as wireless local area network or 3G/LTE networks. As a countermeasure to attack, clustering is used, where each node must be authenticated with the corresponding clusterhead in the cluster, and all data must be encrypted. In this paper, a new clusterbased secure communication scheme is proposed in which mutual authentications are performed before data transmission. In contrast to conventional schemes that use public key infrastructure cryptosystems, resulting in serious overheads in terms of computation and communication, our authentication process uses a station-to-station protocol, which is in itself an extended version of the Diffie-Hellman key exchange protocol to establish authenticated context. Moreover, attacks like replay attacks and man-in-themiddle attacks can be prevented by additional security mechanisms in the authentication and communication processes such as hash-function message authentication codes. Our proposed scheme not only meets all the security requirements, but also supports efficient communication. Performance analysis demonstrates the superiority of our scheme to related schemes.

UR - http://www.scopus.com/inward/record.url?scp=85031693820&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85031693820&partnerID=8YFLogxK

U2 - 10.6138/JIT.2017.18.5.20130514

DO - 10.6138/JIT.2017.18.5.20130514

M3 - Article

VL - 18

SP - 1127

EP - 1138

JO - Journal of Internet Technology

JF - Journal of Internet Technology

SN - 1607-9264

IS - 5

ER -