A secure architecture for mobile ad hoc networks

被引:0
|
作者
Rachedi, Abderrezak [1 ]
Benslimane, Abderrahim [2 ]
机构
[1] Univ Avignon, CERI, LIA, Agroparc BP 1228, F-84911 Avignon, France
[2] Ecole Polytech, Dept Comp Engn, LARIM, Montreal, PQ H3C 3A7, Canada
关键词
wireless ad hoc networks; security; clustering algorithm;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metric, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present new approach Dynamic Demilitarized Zone (DDMZ) to protect CA in each cluster. The principle idea of DDMZ consists to select the dispensable nodes, also called registration authorities; these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to CA. With this approach, we can avoid the single point of failure in each cluster. This architecture can be easily extended to other hierarchical routing protocols. Simulation results confirm that our architecture is scalable and secure.
引用
收藏
页码:424 / +
页数:2
相关论文
共 50 条
  • [1] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [2] A secure incentive architecture for ad hoc networks
    He, Qi
    Wu, Dapeng
    Khosla, Pradeep
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 333 - 346
  • [3] A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
    Rachedi, A.
    Benslimane, A.
    Otrok, H.
    Mohammed, N.
    Debbabi, M.
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 417 - 422
  • [4] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [5] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [6] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Muthumanickam Gunasekaran
    Kandhasamy Premalatha
    [J]. EURASIP Journal on Wireless Communications and Networking, 2013
  • [7] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Gunasekaran, Muthumanickam
    Premalatha, Kandhasamy
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [8] Security architecture for the mobile ad hoc networks
    Filipek, Jozef
    Hudec, Ladislav
    [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2018, 69 (03): : 198 - 204
  • [9] A Distributed Secure Architecture for Vehicular Ad Hoc Networks
    Gazdar, Tahani
    Belghith, Abdelfettah
    Benslimane, Abderrahim
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (04) : 38 - 63
  • [10] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,