Security Classification-Based Encryption and Detection in Mobile Ad Hoc Networks

被引:0
|
作者
Liu, Mengyao [1 ]
Zhang, Yanyan [1 ]
Xia, Li [1 ]
机构
[1] Univ Northeast, Dept Informat Sci & Engn, Shenyang 110819, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to characteristics of open medium, dynamic topology and lack of centralized monitoring, the security of Mobile Ad Hoc Network is more rigorous than that of traditional network. Ad Hoc on Demand Distance Vector Routing (AODV) is an important on-demand routing protocol for Ad Hoc Network, it has no security mechanisms which put the whole network in danger of malicious node attack. To address the security issue, we establish a Trust classification (TC) trust model which can effectively evaluate the trust value of each node, then we introduce an efficient RSA public key encryption scheme based on security level; on the basis of these two works, a new protocol named Trust classification Encryption-AODV (TCE-AODV) is developed. The simulation results show that TCE-AODV is better than AODV in average end-to-end delay and outperforms in identification of malicious nodes.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [21] Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks
    Krishnan, R. Santhana
    Julie, E. Golden
    Robinson, Y. Harold
    Kumar, Raghvendra
    Le Hoang Son
    Tong Anh Tuan
    Hoang Viet Long
    WIRELESS NETWORKS, 2020, 26 (02) : 1275 - 1289
  • [22] Classification of Mobile Ad Hoc Networks Attacks
    Sbai, Oussama
    Elboukhari, Mohamed
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 618 - 624
  • [23] Efficient hierarchical identity-based encryption for Mobile Ad hoc Networks
    He, Kai
    Chen, Min-Rong
    Mao, Yijun
    Zhang, Xi
    Zhang, Yiju
    MOBILE INFORMATION SYSTEMS, 2014, 10 (04) : 407 - 425
  • [24] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [25] AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS
    Yi Ping Zhong Yiping Zhang Shiyong Department of Computing and Information Technology Fudan University Shanghai China
    JournalofElectronics, 2006, (03) : 417 - 422
  • [26] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [28] Cost management based security framework in mobile ad hoc networks
    Yang R.-J.
    Xia Q.
    Pan Q.-H.
    Wang W.-N.
    Li M.-L.
    J Zhejiang Univ: Sci, 2006, 4 (493-501): : 493 - 501
  • [29] AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS
    Yi Ping Zhong Yiping Zhang Shiyong (Department of Computing and Information Technology
    Journal of Electronics(China), 2006, (03) : 417 - 422
  • [30] On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
    Yap, Wun-She
    Liu, Joseph K.
    Tan, Syh-Yuan
    Goi, Bok-Min
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3094 - 3098