Security for cluster based ad hoc networks

被引:33
|
作者
Varadharajan, V [1 ]
Shankaran, R [1 ]
Hitchens, M [1 ]
机构
[1] Macquarie Univ, Dept Comp Informat & Networked Syst Secur Res, Sydney, NSW 2109, Australia
关键词
secure mobile ad; hoc networks; network security; security architecture; secure protocols; key management;
D O I
10.1016/j.comcom.2003.10.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed infrastructure. Each host acts as a specialised router to relay information to other nodes. Near-Term Digital Radio (NTDR) networks, which follow the cluster based design principles, are designed specifically for use in ad hoc networks. A major challenge in the design of these networks is their vulnerability to security attacks. In this paper, we describe the security threats and propose security services to counteract these threats in cluster-based NTDR ad hoc networks. We describe secure schemes for a mobile node to initiate, join and leave a cluster. We also discuss the secure end-to-end communication and group key management related issues for NTDR networks. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:488 / 501
页数:14
相关论文
共 50 条
  • [41] Anonymity and Security in Mobile Ad Hoc Networks
    Bolla, Jhansi Vazram
    Vatsavayi, Valli Kumari
    Murthy, J. V. R.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 71 - +
  • [42] A review of security in mobile ad hoc networks
    Gandhi, Charu
    Dave, Mayank
    [J]. IETE TECHNICAL REVIEW, 2006, 23 (06) : 335 - 344
  • [43] Security architecture for the mobile ad hoc networks
    Filipek, Jozef
    Hudec, Ladislav
    [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2018, 69 (03): : 198 - 204
  • [44] Scalable security schemes for Ad Hoc networks
    Bhargava, S
    Agrawal, DP
    [J]. 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1089 - 1094
  • [45] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [46] Routing and security in mobile ad hoc networks
    Milanovic, N
    Malek, M
    Davidson, A
    Milutinovic, V
    [J]. COMPUTER, 2004, 37 (02) : 61 - +
  • [47] Security and trust in Mobile Ad Hoc Networks
    Guizani, Mohsen
    [J]. CNSR 2006: Communication Networks and Services Research Conference, Proceedings, 2006, : 4 - 5
  • [48] Survey of security for mobile ad hoc networks
    Yi, Ping
    Jiang, Yi-Chuan
    Zhang, Shi-Yong
    Zhong, Yi-Ping
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (05): : 893 - 899
  • [49] On the cluster based dynamic channel assignment for multihop ad hoc networks
    Hou, TC
    Tsai, TJ
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2002, 4 (01) : 40 - 47
  • [50] A Cluster-Based Trust Model for Mobile Ad hoc Networks
    Chen Aiguo
    Xu Guoai
    Yang Yixian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4578 - 4581