Security Classification-Based Encryption and Detection in Mobile Ad Hoc Networks

被引:0
|
作者
Liu, Mengyao [1 ]
Zhang, Yanyan [1 ]
Xia, Li [1 ]
机构
[1] Univ Northeast, Dept Informat Sci & Engn, Shenyang 110819, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to characteristics of open medium, dynamic topology and lack of centralized monitoring, the security of Mobile Ad Hoc Network is more rigorous than that of traditional network. Ad Hoc on Demand Distance Vector Routing (AODV) is an important on-demand routing protocol for Ad Hoc Network, it has no security mechanisms which put the whole network in danger of malicious node attack. To address the security issue, we establish a Trust classification (TC) trust model which can effectively evaluate the trust value of each node, then we introduce an efficient RSA public key encryption scheme based on security level; on the basis of these two works, a new protocol named Trust classification Encryption-AODV (TCE-AODV) is developed. The simulation results show that TCE-AODV is better than AODV in average end-to-end delay and outperforms in identification of malicious nodes.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [31] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330
  • [32] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [33] Layered security design for mobile ad hoc networks
    Komninos, N
    Vergados, D
    Douligeris, C
    COMPUTERS & SECURITY, 2006, 25 (02) : 121 - 130
  • [34] A Security Architecture for Tactical Mobile Ad hoc Networks
    Wang, Hengjun
    Wang, Yadi
    Han, Jihong
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 312 - 315
  • [35] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [36] Security in mobile ad hoc networks: Challenges and solutions
    Yang, H
    Luo, HY
    Ye, F
    Lu, SW
    Zhang, LX
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 38 - 47
  • [37] Security in wireless mobile Ad Hoc and sensor networks
    Guizani, Mohsen
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    Mueller, Peter
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 6 - 7
  • [38] Advances In Distributed Security For Mobile Ad Hoc Networks
    Filipek, Jozef
    Hudec, Ladislav
    COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 89 - 96
  • [39] A tactical security architecture for mobile ad hoc networks
    Yuen, ST
    Kambhampati, R
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 572 - 577
  • [40] A security architecture for multihop mobile ad hoc networks with mobile agents
    Shaikh, Roshan A.
    Shaikh, Zubair A.
    PROCEEDINGS OF THE INMIC 2005: 9TH INTERNATIONAL MULTITOPIC CONFERENCE - PROCEEDINGS, 2005, : 300 - 307