Secure data communication in mobile ad hoc networks

被引:62
作者
Papadimitratos, P [1 ]
Haas, ZJ [1 ]
机构
[1] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
fault tolerance; mobile ad hoc network (MANET); security; multipath routing; network security; secure data transmission; secure message transmission; secure routing;
D O I
10.1109/JSAC.2005.861392
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures. We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
[31]   A novel secure communication scheme in vehicular ad hoc networks [J].
Wang, Neng-Wen ;
Huang, Yueh-Min ;
Chen, Wei-Ming .
COMPUTER COMMUNICATIONS, 2008, 31 (12) :2827-2837
[32]   Secure data forwarding in wireless ad hoc networks [J].
Huang, Q ;
Avramopoulos, IC ;
Kobayashi, H ;
Liu, B .
ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, :3525-3531
[33]   Secure, pseudonymous, and auditable communication in vehicular ad hoc networks [J].
Kamat, Pandurang ;
Baliga, Arati ;
Trappe, Wade .
SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) :233-244
[34]   Multipath routing based secure data transmission in ad hoc networks [J].
Zhao, Li ;
Delgado-Frias, Jose G. .
WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, :17-+
[35]   Virtual Closed Networks: A Secure Approach to Autonomous Mobile Ad hoc Networks [J].
Hurley-Smith, Darren ;
Wetherall, Jodie ;
Adekunle, Andrew .
2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, :391-398
[36]   A Key Management Solution for Secure Routing in Mobile Ad Hoc Networks [J].
Ashraph, Sulaiman ;
Dawoud, Dawoud S. ;
Niyonkuru, Adronis .
IMETI 2011: 4TH INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II, 2011, :68-72
[37]   A secure and resistant architecture against attacks for mobile ad hoc networks [J].
Rachedi, Abderrezak ;
Benslimane, Abderrahim .
SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) :150-166
[38]   Secure neighbor discovery and wormhole localization in mobile ad hoc networks [J].
Stoleru, Radu ;
Wu, Haijie ;
Chenji, Harsha .
AD HOC NETWORKS, 2012, 10 (07) :1179-1190
[39]   A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks [J].
Zhou, Jipeng ;
Lu, Zhengjun .
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, :363-366
[40]   Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions [J].
Xu, Shouhuai ;
Capkun, Srdjan .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)