Security management in hierachical ad hoc network

被引:0
|
作者
Yang, PL [1 ]
Zheng, SR [1 ]
机构
[1] Nanjing Univ Sci & Technol PLA, Telecom Engn Dept, Nanjing 210016, JiangSu, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile as-hoc networking (MANET) is an infrastructureless network composing many hosts moving in arbitrary manner. Due to unpredictable and synamic environments, the MANET networks have much more restricted security requirements than the traditional wired-and-static network. Although a security model based on CA (Vertification Authority) have been inplemented to make the security goal achieved, there are still problems can not be avoided, such as, the "bottle neck" of CA. Moreover the CA mechanism also violates the robustness of the wireless system. In this paper, wer present common security problems related to routing, and make some discussses on some of the contemporary solutions that are seemingly inadequate for protecting the routing in MANET networks. As a result, we deliver a security-policy based on the hierarchial routing. It not only provides the robustness of the network and eliminates the "bottle neck" in the system, but also comply with the organization system especially in the army.
引用
收藏
页码:B642 / B649
页数:8
相关论文
共 50 条
  • [21] Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network
    Mo, Jiawei
    Huang, Baohua
    Cheng, Xiaolu
    Huang, Caixia
    Wei, Feng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (10):
  • [22] Security Issues in Vehicular Ad Hoc Network: A Critical Survey
    Arif, Mohammad
    Ahmad, Shish
    INTELLIGENT COMMUNICATION, CONTROL AND DEVICES, ICICCD 2017, 2018, 624 : 527 - 536
  • [23] Security Solution for Mobile Ad hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 255 - 262
  • [24] How to Bootstrap Security for Ad-Hoc Network: Revisited
    Shin, Wook
    Gunter, Carl A.
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 119 - 131
  • [25] A systematic review on security issues in vehicular ad hoc network
    Tanwar, Sudeep
    Vora, Jayneel
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2018, 1 (05):
  • [26] An Innovative Approach For Security On Mobile Ad-Hoc Network
    Hari, Pranav
    Shukla, Vinay Krishna
    Verma, Pushpendra R.
    2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 759 - 765
  • [27] An efficient key predistribution scheme for ad hoc network security
    Ramkumar, M
    Memon, N
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (03) : 611 - 621
  • [28] Enhance Security For Spontaneous Wireless Ad Hoc Network Creation
    Shinde, Kiran Vijaykumar
    Kaur, Harjeet
    Patil, Prakash
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 247 - 250
  • [29] Security challenges for routing protocols in mobile ad hoc network
    Kakade, Kiran Shrimant
    Rajesh, C.
    Veena, T.
    Sivakumar, P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (03) : 344 - 356
  • [30] Overview on Vehicular Ad Hoc Network and its Security Issues
    Kumar, Ankit
    Sinha, Madhavi
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 792 - 797