Security for cluster based ad hoc networks

被引:33
|
作者
Varadharajan, V [1 ]
Shankaran, R [1 ]
Hitchens, M [1 ]
机构
[1] Macquarie Univ, Dept Comp Informat & Networked Syst Secur Res, Sydney, NSW 2109, Australia
关键词
secure mobile ad; hoc networks; network security; security architecture; secure protocols; key management;
D O I
10.1016/j.comcom.2003.10.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed infrastructure. Each host acts as a specialised router to relay information to other nodes. Near-Term Digital Radio (NTDR) networks, which follow the cluster based design principles, are designed specifically for use in ad hoc networks. A major challenge in the design of these networks is their vulnerability to security attacks. In this paper, we describe the security threats and propose security services to counteract these threats in cluster-based NTDR ad hoc networks. We describe secure schemes for a mobile node to initiate, join and leave a cluster. We also discuss the secure end-to-end communication and group key management related issues for NTDR networks. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:488 / 501
页数:14
相关论文
共 50 条
  • [31] Security Threats in Vehicular Ad Hoc Networks
    Al Hasani, Ahmed Shoeb
    Hossain, Md. Shohrab
    Atiquzzaman, Mohammed
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 404 - 411
  • [32] Security in ad hoc networks and pervasive computing
    Wu, Isaac Z.
    Li, X. -Y.
    Song, M.
    Liu, C. -M.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 359 - 361
  • [33] Efficient security management for ad hoc networks
    Wang, Sherry
    Zheng, Harold
    Wang, Wenye
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 469 - +
  • [34] Security of Ad Hoc Networks and Threshold Cryptography
    Ertaul, L
    Chavan, N
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 69 - 74
  • [35] Multilevel security model for ad hoc networks
    Changda, Wang
    Shiguang, Ju
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 391 - +
  • [36] Security scheme for ad-hoc networks
    Kalligeros, H
    Hadjiefthymiades, S
    Frantzeskakis, D
    [J]. ISSE 2005 - Securing Electronic Business Processes, 2005, : 52 - 61
  • [37] Scaling dependability and security in ad hoc networks
    de Lemos, Rogerio
    [J]. Dependable Computing, Proceedings, 2007, 4746 : 237 - 237
  • [38] The Study on AD HOC Networks Security Solution
    Li Rongguo
    [J]. ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1451 - 1457
  • [39] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [40] Adaptive security for multilevel ad hoc networks
    Kong, JJ
    Luo, HY
    Xu, KX
    Gu, DL
    Gerla, M
    Lu, SW
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05): : 533 - 547