Providing robust and ubiquitous security support for mobile ad-hoc networks

被引:0
|
作者
Kong, JJ [1 ]
Zerfos, P [1 ]
Luo, HY [1 ]
Lu, SW [1 ]
Zhang, LX [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security support for mobile ad-hoc networks is challenging for several reasons: (a) wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional break-ins by adversaries may be inevitable in a large time window; (b) mobile users demand "anywhere, anytime" services; (c) a scalable solution is needed for a large-scale mobile network. In this paper we describe a solution that supports ubiquitous security services for mobile hosts, scales to network size, and is robust against break-ins. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each entity, holds a secret share and multiple entities in a local neighborhood jointly, provide complete services. We employ localized certification schemes to enable ubiquitous services, We also update the secret shares to further enhance robustness against break-ins. Both simulations and implementation confirm the effectiveness of our design.
引用
收藏
页码:251 / 260
页数:10
相关论文
共 50 条
  • [1] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [2] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330
  • [3] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [4] QoS support in mobile ad-hoc networks
    Gupta, A
    Sanghi, D
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2000, : 340 - 344
  • [5] Ubiquitous access through the integration of mobile ad-hoc networks
    Sargento, S.
    Sarro, R.
    Duarte, R.
    Stupar, P.
    Gallera, F.
    Natkaniec, M.
    Vilela, J. P.
    Barros, J.
    [J]. 2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 1072 - +
  • [6] Cooperative Security Schemes for Mobile Ad-Hoc Networks
    Caballero-Gil, P.
    Hernandez-Goya, C.
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 286 - 294
  • [7] Robust Control in Sparse Mobile Ad-Hoc Networks
    Altman, Eitan
    Aram, Alireza
    Basar, Tamer
    Touati, Corinne
    Sarkar, Saswati
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 123 - +
  • [8] Providing real-time security support for multi-level ad-hoc networks
    Kong, JJ
    Gerla, M
    [J]. 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1350 - 1355
  • [9] Ad-hoc networks security
    Raju, G. V. S.
    [J]. 3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 209 - 212
  • [10] Bootstrapping security associations for routing in mobile ad-hoc networks
    Bobba, RB
    Eschenauer, L
    Gligor, V
    Arbaugh, W
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1511 - 1515