Secure data communication in mobile ad hoc networks

被引:62
|
作者
Papadimitratos, P [1 ]
Haas, ZJ [1 ]
机构
[1] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
fault tolerance; mobile ad hoc network (MANET); security; multipath routing; network security; secure data transmission; secure message transmission; secure routing;
D O I
10.1109/JSAC.2005.861392
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures. We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
  • [21] Secure node misbehaviors in mobile ad hoc networks
    Chigan, CX
    Bandaru, R
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4730 - 4734
  • [22] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [23] A confident community to secure Mobile Ad hoc Networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    Guang, Lei
    Assi, Chadi
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1254 - +
  • [24] A secure and decentralised SIP for mobile ad hoc networks
    Hussain, Mohammed
    Ben Khedher, Dhafer
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 20 (01) : 1 - 15
  • [25] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [26] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [27] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [28] A secure incentive protocol for mobile ad hoc networks
    Yanchao Zhang
    Wenjing Lou
    Wei Liu
    Yuguang Fang
    Wireless Networks, 2007, 13 : 569 - 582
  • [29] An Adaptive Secure Fuzzy Multicast communication in Large Scale Mobile Ad Hoc Networks
    Reddy, B. G. Obula
    Ussenaiah, Maligela
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (11): : 70 - 79
  • [30] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136