Security for cluster based ad hoc networks

被引:33
|
作者
Varadharajan, V [1 ]
Shankaran, R [1 ]
Hitchens, M [1 ]
机构
[1] Macquarie Univ, Dept Comp Informat & Networked Syst Secur Res, Sydney, NSW 2109, Australia
关键词
secure mobile ad; hoc networks; network security; security architecture; secure protocols; key management;
D O I
10.1016/j.comcom.2003.10.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed infrastructure. Each host acts as a specialised router to relay information to other nodes. Near-Term Digital Radio (NTDR) networks, which follow the cluster based design principles, are designed specifically for use in ad hoc networks. A major challenge in the design of these networks is their vulnerability to security attacks. In this paper, we describe the security threats and propose security services to counteract these threats in cluster-based NTDR ad hoc networks. We describe secure schemes for a mobile node to initiate, join and leave a cluster. We also discuss the secure end-to-end communication and group key management related issues for NTDR networks. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:488 / 501
页数:14
相关论文
共 50 条
  • [1] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [2] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [3] A cluster-based security architecture for ad hoc networks
    Bechler, M
    Hof, HJ
    Kraft, D
    Pählke, F
    Wolf, L
    [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2393 - 2403
  • [4] Security in ad hoc networks
    Molva, R
    Michiardi, P
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775
  • [5] Cluster based trust evaluation in ad hoc networks
    Park, C
    Lee, Y
    Yoon, H
    Jin, S
    Choi, D
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 503 - 507
  • [6] Ad hoc networks security mechanism based on CPK
    Lei Feng-Yu
    Cui Guo-Hua
    Liao Xiao-Ding
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 522 - +
  • [7] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95
  • [8] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [9] The Research on AD HOC Networks Security
    Zhou Mingji
    [J]. SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 895 - 902
  • [10] Security in mobile ad hoc networks
    Carvalho, Marco
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (02) : 72 - 75