Multilevel security model for ad hoc networks

被引:22
|
作者
Changda, Wang [1 ,2 ]
Shiguang, Ju [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Telecommun Engn, Jiangsu 212013, Peoples R China
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
ad hoc network; multilevel security model; access control;
D O I
10.1016/S1002-0705(08)60072-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
引用
收藏
页码:391 / +
页数:8
相关论文
共 50 条
  • [1] Multilevel security model for ad hoc networks
    Wang Changda1
    2. School of Computer Science
    [J]. Journal of Systems Engineering and Electronics, 2008, (02) : 391 - 397
  • [2] Adaptive security for multilevel ad hoc networks
    Kong, JJ
    Luo, HY
    Xu, KX
    Gu, DL
    Gerla, M
    Lu, SW
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05): : 533 - 547
  • [3] Security in ad hoc networks
    Molva, R
    Michiardi, P
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775
  • [4] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [5] An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
    Sathishkumar Alampalayam
    Anup Kumar
    [J]. Wireless Personal Communications, 2004, 29 : 263 - 281
  • [6] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126
  • [7] An adaptive and predictive security model for mobile ad hoc networks
    Alampalayam, S
    Kumar, A
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 263 - 281
  • [8] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95
  • [9] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [10] The Research on AD HOC Networks Security
    Zhou Mingji
    [J]. SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 895 - 902