Modeling secure connectivity of self-organized wireless ad hoc networks

被引:0
|
作者
Zhang, Chi [1 ]
Song, Yang [1 ]
Fang, Yuguang [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless ad hoc networks (WANETs) offer communications over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in self-organized WANETs is more challenging than in conventional networks due to the lack of central authorities. In this paper, we propose a generic model to evaluate the relationship of connectivity, memory size, communication overhead and security, in fully self-organized WANETs. Based on some reasonable assumptions on node deployment and mobility, we show that when the average number of authenticated neighbors of each node is H(I), with respect to the network size n, most of the nodes can he securely connected, Forming a connected secure backbone, Le the secure network percolates. This connected secure backbone can he utilized to break routing-security dependency loop, and provide enough derived secure links connecting isolated nodes with the secure backbone in a multi-hop fashion, which leads to the secure connectivity, of the whole network.
引用
下载
收藏
页码:825 / 833
页数:9
相关论文
共 50 条
  • [1] Physical connectivity of self-organized ad hoc wireless networks
    Dousse, O
    Thiran, P
    IEEE INTELLIGENT SYSTEMS, 2003, 18 (04): : 83 - 86
  • [2] Scalability and security of self-organized wireless ad hoc networks
    Zhang, Chi
    Fang, Yuguang
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2884 - 2890
  • [3] Dynamically self-organized service composition in wireless ad hoc networks
    Zhang, Q
    Chen, HQ
    Yu, YJ
    Xie, ZP
    Shi, B
    TECHNOLOGIES FOR E-SERVICES, 2005, 3324 : 95 - 106
  • [4] Fully Self-Organized Key Agreement for Ad-Hoc Wireless Networks
    Sieka, Bartlomiej
    Kshemkalyani, Ajay D.
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 80 - 85
  • [5] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [6] Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
    Choi, Daeseon
    Lee, Younho
    Park, Yongsu
    Jin, Seung-hun
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (11) : 3574 - 3583
  • [7] Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks
    Chopra, Amit
    Kumar, Rajneesh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 155 - 163
  • [8] Self-Organized Monitoring in Ad-Hoc Networks
    Remi Badonnel
    Radu State
    Olivier Festor
    Telecommunication Systems, 2005, 30 : 143 - 160
  • [9] On the connectivity modeling of wireless Ad Hoc networks
    Sarker, JH
    Jäntti, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 454 - 458
  • [10] Self-organized monitoring in ad-hoc networks
    Badonnel, R
    State, R
    Festor, O
    TELECOMMUNICATION SYSTEMS, 2005, 30 (1-3) : 143 - 160