Security Classification-Based Encryption and Detection in Mobile Ad Hoc Networks

被引:0
|
作者
Liu, Mengyao [1 ]
Zhang, Yanyan [1 ]
Xia, Li [1 ]
机构
[1] Univ Northeast, Dept Informat Sci & Engn, Shenyang 110819, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to characteristics of open medium, dynamic topology and lack of centralized monitoring, the security of Mobile Ad Hoc Network is more rigorous than that of traditional network. Ad Hoc on Demand Distance Vector Routing (AODV) is an important on-demand routing protocol for Ad Hoc Network, it has no security mechanisms which put the whole network in danger of malicious node attack. To address the security issue, we establish a Trust classification (TC) trust model which can effectively evaluate the trust value of each node, then we introduce an efficient RSA public key encryption scheme based on security level; on the basis of these two works, a new protocol named Trust classification Encryption-AODV (TCE-AODV) is developed. The simulation results show that TCE-AODV is better than AODV in average end-to-end delay and outperforms in identification of malicious nodes.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [41] Security in Ad Hoc Networks: A Location Based Impersonation Detection Method
    Rana, Md. Mashud
    Ahmed, Khandakar Entenam Unayes
    Sumel, Nazmur Rowshan
    Alam, Md. Shamsul
    Sarkar, Liton
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL II, PROCEEDINGS, 2009, : 380 - 384
  • [42] Performance of PKI-based security mechanisms in mobile ad hoc networks
    Schwingenschlögl, C
    Eichler, S
    Müller-Rathgeber, B
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2006, 60 (01) : 20 - 24
  • [43] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032
  • [44] Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
    Liu, Gao
    Yan, Zheng
    Pedrycz, Witold
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 105 : 105 - 122
  • [45] Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
    Narula, Prayag
    Dhurandher, Sanjay Kumar
    Misra, Sudip
    Woungang, Isaac
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 760 - 769
  • [46] Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation
    Lin, T.
    Wu, P.
    Gao, F. M.
    Wu, T. S.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2019, 14 (05) : 660 - 671
  • [47] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [48] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [49] Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
    Zegzhda, P. D.
    Ivanov, D. V.
    Moskvin, D. A.
    Kubrin, G. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 993 - 999
  • [50] Security Solution for Mobile Ad hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 255 - 262