A secure architecture for mobile ad hoc networks

被引:0
|
作者
Rachedi, Abderrezak [1 ]
Benslimane, Abderrahim [2 ]
机构
[1] Univ Avignon, CERI, LIA, Agroparc BP 1228, F-84911 Avignon, France
[2] Ecole Polytech, Dept Comp Engn, LARIM, Montreal, PQ H3C 3A7, Canada
关键词
wireless ad hoc networks; security; clustering algorithm;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metric, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present new approach Dynamic Demilitarized Zone (DDMZ) to protect CA in each cluster. The principle idea of DDMZ consists to select the dispensable nodes, also called registration authorities; these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to CA. With this approach, we can avoid the single point of failure in each cluster. This architecture can be easily extended to other hierarchical routing protocols. Simulation results confirm that our architecture is scalable and secure.
引用
收藏
页码:424 / +
页数:2
相关论文
共 50 条
  • [21] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [22] Secure multipath communication in mobile ad hoc networks
    Burmester, M
    Van Le, T
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 405 - 409
  • [23] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [24] Advanced Secure Routing in Ad hoc mobile networks
    Padmadas, M.
    Krishnan, N.
    Sasidharan, Sithara
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 821 - 824
  • [25] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    [J]. IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [26] A Security Architecture for Tactical Mobile Ad hoc Networks
    Wang, Hengjun
    Wang, Yadi
    Han, Jihong
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 312 - 315
  • [27] Publish/Subscribe Architecture for Mobile Ad hoc Networks
    Rezende, Cristiano G.
    Rocha, Bruno P. S.
    Loureiro, Antonio A. F.
    [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1913 - 1917
  • [28] A tactical security architecture for mobile ad hoc networks
    Yuen, ST
    Kambhampati, R
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 572 - 577
  • [29] Survey on Secure Routing in Mobile Ad-hoc Networks
    Kannammal, A.
    Roy, S. Sujith
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
  • [30] SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016 (2016)