Security Classification-Based Encryption and Detection in Mobile Ad Hoc Networks

被引:0
|
作者
Liu, Mengyao [1 ]
Zhang, Yanyan [1 ]
Xia, Li [1 ]
机构
[1] Univ Northeast, Dept Informat Sci & Engn, Shenyang 110819, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to characteristics of open medium, dynamic topology and lack of centralized monitoring, the security of Mobile Ad Hoc Network is more rigorous than that of traditional network. Ad Hoc on Demand Distance Vector Routing (AODV) is an important on-demand routing protocol for Ad Hoc Network, it has no security mechanisms which put the whole network in danger of malicious node attack. To address the security issue, we establish a Trust classification (TC) trust model which can effectively evaluate the trust value of each node, then we introduce an efficient RSA public key encryption scheme based on security level; on the basis of these two works, a new protocol named Trust classification Encryption-AODV (TCE-AODV) is developed. The simulation results show that TCE-AODV is better than AODV in average end-to-end delay and outperforms in identification of malicious nodes.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [1] Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks
    Wu, Xuewen
    Zhu, Xiaokai
    Kong, Fei
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1787 - 1791
  • [2] An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks
    Ahmed, Firoz
    Oh, Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 1 - 9
  • [3] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [4] Security in mobile ad hoc networks
    Carvalho, Marco
    IEEE SECURITY & PRIVACY, 2008, 6 (02) : 72 - 75
  • [5] Security model based mobile agent for mobile ad hoc networks
    Ahmed, Maqbol
    Okba, Kazar
    Abdelbasset, Barkat
    Mouadh, Bali
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 22 (01) : 36 - 54
  • [6] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [7] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [8] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542
  • [9] Security Issues In Mobile Ad Hoc Networks
    Sarika, S.
    Pravin, A.
    Vijayakumar, A.
    Selvamani, K.
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 329 - 335
  • [10] Security Issues in Mobile Ad Hoc Networks
    Sandoval Orozco, A. L.
    Garcia Matesanz, J.
    Garcia Villalba, L. J.
    Marquez Diaz, J. D.
    Kim, T. -H.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,