Cluster based security scheme in wireless Ad Hoc networks

被引:2
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
机构
[1] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 2卷 / 238-243期
关键词
Ad hoc networks; Certificate; Cluster head; Cluster network; Wireless security;
D O I
10.1360/crad20060208
中图分类号
学科分类号
摘要
Wireless ad hoc networks are a kind of networks that do not need communication infrastructure. Such networks are being used in more and more areas. The security of ad hoc networks has become a hot research point in the latest years. The security of cluster based ad hoc networks is analyzed and a new scheme is proposed to solve the security problems existing in such networks. The main contributions of the scheme are as follows: (1) presenting a security mechanism to secure the cluster heads; and (2) proposing a mechanism to remove the security defects in the roaming of mobile nodes, and providing a related algorithm. Simulation is performed to test the scheme. The experiment results show that the scheme is feasible. Compared with related security schemes for cluster based ad hoc networks, the proposed scheme is more secure, and has a better network performance.
引用
收藏
页码:238 / 243
页数:5
相关论文
共 8 条
[1]  
Zhou L., Haas Z.J., Securing ad hoc networks, IEEE Network Magazine, 13, 6, pp. 24-30, (1999)
[2]  
Kong J., Zerfos P., Luo H., Providing robust and ubiquitous security support for mobile ad hoc networks, IEEE ICNP (Int'l Conf. Network Protocols), (2001)
[3]  
Hubaux J.-P., Buttyan L., Capkun S., The quest for security in mobile ad hoc networks, The 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, (2001)
[4]  
Crepeau C., Davis C.R., A certificate revocation scheme for wireless ad hoc networks, The 1st ACM Workshop Security of Ad Hoc and Sensor Networks, (2003)
[5]  
Jiang M., Li J., Tay Y.C., Cluster based routing protocol, (1999)
[6]  
Venkatraman L., Agrawal D.P., A novel authentication scheme for ad hoc networks, IEEE Wireless Communications and Networking Conf., (2000)
[7]  
Bechler M., Hof H.J., Kraft D., A cluster-based security architecture for ad hoc networks, IEEE INFOCOM2004, (2004)
[8]  
Awerbuch B., Holmer D., Nita-Rotaru C., An on-demand secure routing protocol resilient to Byzantine failures, ACM Workshop on Wireless Security (WiSe) 2002, (2002)