Security model based mobile agent for mobile ad hoc networks

被引:1
|
作者
Ahmed, Maqbol [1 ]
Okba, Kazar [1 ]
Abdelbasset, Barkat [1 ]
Mouadh, Bali [2 ]
机构
[1] Biskra Univ, Dept Comp Sci, LINFI Lab, Biskra, Algeria
[2] El Oued Univ, Dept Comp Sci, El Oued, Algeria
关键词
ad hoc network; mobile agent; security model; trust; IDS; aglets; communication; agent; control; cluster; node;
D O I
10.1504/IJCNDS.2019.096525
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a security model based mobile agent for MANETs, the objective here is to improve the security level of the network communication without affecting its performance. The model includes a hierarchical clustering and mobile agents. We apply the concept of dominating set based clustering for partitioning the network into clusters. The cluster head election is based on both the trust and resources ability of the node. We define four agent types. The node agent manages the use of node resources. The ambassador agent is created by the control agent to monitor all the actions of the node agent. The control agent is created in the most trusted with best resources node to control the communication into the cluster and participates with its counterparts in the security network completely, and the transporter agent carries the encrypted information in the network.
引用
收藏
页码:36 / 54
页数:19
相关论文
共 50 条
  • [1] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [2] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [3] Mobile Agent Based Topology Discovery in Mobile Ad Hoc Networks
    Wei, Jing
    Guo, Wei
    Su, Jian
    Tang, Wei
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2964 - 2967
  • [4] Security in mobile ad hoc networks
    Carvalho, Marco
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (02) : 72 - 75
  • [5] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    [J]. MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [6] An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
    Sathishkumar Alampalayam
    Anup Kumar
    [J]. Wireless Personal Communications, 2004, 29 : 263 - 281
  • [7] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126
  • [8] Mobile Agent Based Protocol for Location Management in Mobile Ad Hoc Networks
    Mallikarjun, B. C.
    Kapinaiah, Viswanath
    [J]. 2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 406 - 410
  • [9] An adaptive and predictive security model for mobile ad hoc networks
    Alampalayam, S
    Kumar, A
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 263 - 281
  • [10] Security Issues In Mobile Ad Hoc Networks
    Sarika, S.
    Pravin, A.
    Vijayakumar, A.
    Selvamani, K.
    [J]. 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 329 - 335