SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

被引:34
|
作者
Hurley-Smith, Darren [1 ]
Wetherall, Jodie [2 ]
Adekunle, Andrew [2 ]
机构
[1] Univ Kent, Sch Comp Sci, Canterbury, Kent, England
[2] Univ Greenwich, Fac Engn & Sci, Chatham ME4 4TB, Kent, England
关键词
Access control; authentication; communication system security; mobile ad hoc networks;
D O I
10.1109/TMC.2017.2649527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasingly popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection. The use of communication security protocols originally developed for wireline and WiFi networks can also place a heavy burden on the limited network resources of a MANET. To address these issues, a novel secure framework (SUPERMAN) is proposed. The framework is designed to allow existing network and routing protocols to perform their functions, whilst providing node authentication, access control, and communication security mechanisms. This paper presents a novel security framework for MANETs, SUPERMAN. Simulation results comparing SUPERMAN with IPsec, SAODV, and SOLSR are provided to demonstrate the proposed frameworks suitability for wireless communication security.
引用
收藏
页码:2927 / 2940
页数:14
相关论文
共 50 条
  • [1] Routing and security in mobile ad hoc networks
    Milanovic, N
    Malek, M
    Davidson, A
    Milutinovic, V
    [J]. COMPUTER, 2004, 37 (02) : 61 - +
  • [2] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    [J]. 2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [3] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126
  • [4] Routing security and authentication mechanism for mobile ad hoc networks
    Tsai, YR
    Wang, SJ
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4716 - 4720
  • [5] Routing security and data confidentiality for mobile ad hoc networks
    Ng, KS
    Seah, WKG
    [J]. 57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1821 - 1825
  • [6] Security enhancement for mobile ad hoc networks routing with OLSRv
    Wei, Zhexiong
    Tang, Helen
    Yu, F. Richard
    Wang, Maoyu
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [7] Reputation methods for routing security for mobile ad hoc networks
    Yau, PW
    Mitchell, CJ
    [J]. SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2003, : 130 - 137
  • [8] A Study on Effectiveness using Security Routing based on Mobile Ad-hoc Networks
    Lee, Cheol-seung
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 141 - 152
  • [9] An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks
    VinothKumar, K.
    Rajaram, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (12): : 66 - 73
  • [10] Cooperative security-enforcement routing in mobile ad hoc networks
    Lu, B
    Pooch, UW
    [J]. 2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, 2002, : 157 - 161