Fully Distributed Security Architecture for MANET


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed In MANET any node may compromise the packet routing functionality by disrupting the route discovery process.. These unique characteristics of mobile ad hoc networks causes a number of nontrivial challenges to security design such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Cluster; Denial of Service and MANET Security

Full Text:

PDF


References


B. DeCleene, L. Dondeti, S.Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, s. Vasudevan and C. Zhang. “Secure Group Communication for Wireless Networks”, in proc. IEEE MILCOM01, Oct 2001.
http://dx.doi.org/10.1109/milcom.2001.985773

Charles E. Perkins, Elizabeth M. Belding-Royer and Ian D. Chakeres. “Ad Hoc On-Demand Distance Vector Routing” Mobile Ad Hoc Networking Working Group, Internet Draft, Oct 2003.
http://dx.doi.org/10.17487/rfc3561

Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, 6th Int’l Conf. Mobile Copm. and Net., Aug 2000, pp 275 – 83.

M. Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, ACM Wise, 2002.
http://dx.doi.org/10.1145/570681.570682

Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual IEEE/ACM International Conference on Mobile Computing and Networking (MobiCom 2000), pages 255–265, August 2000.
http://dx.doi.org/10.1145/345910.345955

E.M Belding-Royer, “Hierarchical routing in ad hoc mobile networks” Wireless Communication & Mobile Computing, vol. 2, no. 5, pp. 512 – 532, August 2002.
http://dx.doi.org/10.1002/wcm.74

Y. Zhang, W. Lee, and Y.-A. Huang, “ Intrusion detection techniques for mobile wireless networks,” ACM Mobile Networks and Applications (MONET) J., Vol. 9, no. 5, pp. 545-556, sept. 2002.

Y. Desmedt and S. Jajodia, “Redistributing secret shares to new access structures and its applications,” George Mason Univ., Tech. Rep., 1997.

L. Zhou and Z.J Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, pp. 24-30, june 1999.
http://dx.doi.org/10.1109/65.806983

D.W Carman, P.S. Kruns and B.J Matt “Constraints and Approach for Distributed Sensor Security”, NAI Labs Technical Reports, Sep 2000.

I. Glauche, W. Krause, R. Sollacher, and M. Greiner, “Continuum percolation of wireless ad-hoc communication networks,” cond-mat/0304579, April 2003.
http://dx.doi.org/10.1016/s0378-4371(03)00249-8

L. Buttyan and J.P Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, pp. 579 – 592, Oct 2003.
http://dx.doi.org/10.1023/a:1025146013151

Y.-C. Hu, A. Perrig, and D.B. Johnson, Ariadne: a secure on –demand routing protocol for ad hoc networks,” in Proc. ACM MOBICOM, 2002, pp.12-23.
http://dx.doi.org/10.1145/570645.570648

Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ’02), pages 3– 13, June 2002.
http://dx.doi.org/10.1109/mcsa.2002.1017480

K. Sanzgiri, B. Dahill, B.N Levine, C.Shields and E. Belding-Royer, “A secure routing protocol for ad hoc networks”, in proc. 10th Int. Conf. Network Protocols (ICNP’02) 2002, pp 78-89.
http://dx.doi.org/10.1109/icnp.2002.1181388

C. Krugel and T. Toth, “Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks” Euro. Wireless, Italy 2002.

Nargunam A.S and Sebastian M.P “Fully distributed cluster based routing architecture for mobile ad hoc networks” In Proceedings of the first IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob’2005) pages 383 – 389.
http://dx.doi.org/10.1109/wimob.2005.1512928


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize