Security management in hierachical ad hoc network

被引:0
|
作者
Yang, PL [1 ]
Zheng, SR [1 ]
机构
[1] Nanjing Univ Sci & Technol PLA, Telecom Engn Dept, Nanjing 210016, JiangSu, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile as-hoc networking (MANET) is an infrastructureless network composing many hosts moving in arbitrary manner. Due to unpredictable and synamic environments, the MANET networks have much more restricted security requirements than the traditional wired-and-static network. Although a security model based on CA (Vertification Authority) have been inplemented to make the security goal achieved, there are still problems can not be avoided, such as, the "bottle neck" of CA. Moreover the CA mechanism also violates the robustness of the wireless system. In this paper, wer present common security problems related to routing, and make some discussses on some of the contemporary solutions that are seemingly inadequate for protecting the routing in MANET networks. As a result, we deliver a security-policy based on the hierarchial routing. It not only provides the robustness of the network and eliminates the "bottle neck" in the system, but also comply with the organization system especially in the army.
引用
收藏
页码:B642 / B649
页数:8
相关论文
共 50 条
  • [1] Implementing Key Management for Security in Ad Hoc Network
    Sharma, Avinash
    Agarwal, Narendra
    Roy, Satyabrata
    Sharma, Ajay
    Sharma, Pankaj
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 485 - +
  • [2] Security of Ad Hoc Network
    Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications
    ZTECommunications, 2007, (04) : 24 - 26
  • [3] Security Management for Mobile Ad Hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    Siewe, Francois
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2010, 2 (01) : 1 - 19
  • [4] An Overview of Ad Hoc Network Security
    Yang, Fan
    Zheng, Yulan
    Xiong, Ping
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 129 - 137
  • [5] Review of Vehicular Ad Hoc Network Security
    Kumar, Kuldeep
    Arora, Sandeep Kumar
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (11): : 17 - 34
  • [6] Ad hoc network security measurement and evaluation
    Ning, HZ
    Liu, Y
    He, DQ
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 4, 2005, : 488 - 492
  • [7] Mobile ad hoc network security - a taxonomy
    Alampalayam, S
    Kumar, A
    Srinivasan, S
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 839 - 844
  • [8] Ad hoc network routing and security:: A review
    Zhang, Congzhe
    Zhou, MengChu
    Yu, Ming
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (08) : 909 - 925
  • [9] A novel cryptography for ad hoc network security
    Pi Jian-yong
    Liu Xin-song
    Wu Ai
    Liu Dan
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1448 - +
  • [10] Efficient security management for ad hoc networks
    Wang, Sherry
    Zheng, Harold
    Wang, Wenye
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 469 - +