Cluster based security scheme for mobile ad hoc networks

被引:0
|
作者
Nargunam, A. Shajin [1 ]
Sebastian, M. P. [2 ]
机构
[1] NI Coll Engn, Dept Comp Engn & Sci, Thuckalay, Tamil Nadu, India
[2] Natl Inst Technol Calicut, Dept Comp Sci, Calicut, Kerala, India
关键词
cluster; denial of service; MANET security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. The unique characteristics of mobile ad hoc networks causes a number of nontrivial challenges to security design such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These challenges make a case for building multi-fence security solution that achieves both extensive protection and desirable network performance. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.
引用
收藏
页码:391 / +
页数:2
相关论文
共 50 条
  • [1] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [2] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [3] Security for cluster based ad hoc networks
    Varadharajan, V
    Shankaran, R
    Hitchens, M
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (05) : 488 - 501
  • [4] Two phases based cluster formation scheme for mobile ad hoc networks
    Wang, KC
    Cho, GW
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT I, PROCEEDINGS, 2003, 2657 : 194 - 203
  • [5] Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
    Yao, Yu
    Zhe, Li
    Jun, Liu
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 518 - 521
  • [6] A New Cluster-Based Secure Communication Scheme for Mobile Ad Hoc Networks
    Shi, Fei
    Liu, Weijie
    Song, Jooseok
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 1127 - 1138
  • [7] Cluster-based consistency scheme of cooperative caching in mobile Ad Hoc networks
    Xie, Gao-Gang
    Li, Zhen-Yu
    Chen, Jia-Ning
    [J]. Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 3042 - 3052
  • [8] ACS: An efficient address based cryptography scheme for mobile ad hoc networks security
    Arokiaraj, A. Rex Macedo
    Shanmugam, A.
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 52 - 56
  • [9] Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks
    Wu, Xuewen
    Zhu, Xiaokai
    Kong, Fei
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1787 - 1791
  • [10] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    [J]. DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542