A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks

被引:2
|
作者
Rachedi, A. [1 ]
Benslimane, A. [1 ]
Otrok, H. [2 ]
Mohammed, N. [2 ]
Debbabi, M. [2 ]
机构
[1] Univ Avignon, LIA CERI, Agroparc,BP 1228, F-84911 Avignon, France
[2] Concordia Univ, CIISE, Montreal, PQ H3G 1M8, Canada
关键词
MANET security; mechanism design; certificate authority and clustering;
D O I
10.1109/WiMob.2008.77
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each cluster should contain at least two confident nodes. One is known as CA and the another as register authority RA. The Dynamic Demilitarized Zone (DDMZ) is proposed as a solution for protecting the CA node against potential attacks. It is formed from one or more RA node. The problems of such a model are: (1) Clusters with one confident node, CA, cannot be created and thus clusters' sizes are increased which negatively affect clusters' services and stability. (2) Clusters with high density of RA can cause channel collision at the CA. (3) Clusters' lifetime are reduced since RA monitors are always launched (i.e., resource consumption). In this paper, we propose a model based on mechanism design that will allow clusters with single trusted node (CA) to be created. Our mechanism will motivate nodes that does not belong to the confident community to participate by giving them incentives in the form of trust, which can be used for cluster's services. To achieve this goal, a RA selection algorithm is proposed that selects nodes based on a predefined selection criteria function and location (i.e., using directional antenna). Finally, empirical results are provided to support our solutions.
引用
收藏
页码:417 / 422
页数:6
相关论文
共 50 条
  • [1] A secure architecture for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 424 - +
  • [2] Policy-based design of secure mobile ad-hoc networks
    Aly, Alaaeldin A.
    Memon, Qurban A.
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 314 - 319
  • [3] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [4] Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
    Ali, Masroor
    Ullah, Zahid
    Khan, Meharban
    Hafeez, Abdul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 436 - 441
  • [5] A secure incentive architecture for ad hoc networks
    He, Qi
    Wu, Dapeng
    Khosla, Pradeep
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 333 - 346
  • [6] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [7] The Design of a Secure Key Management System for Mobile Ad hoc Networks
    Boukerche, Azzedine
    Ren, Yonglin
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 309 - 316
  • [8] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [9] Cost management based secure framework in mobile ad hoc networks
    Yang, RJ
    Xia, Q
    Pan, QH
    Wang, WN
    Li, ML
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 63 - 72
  • [10] Secure content based routing in tactical mobile ad hoc networks
    Lin, Yow-Jian
    Natarajan, Narayanan
    MILCOM 2006, VOLS 1-7, 2006, : 1230 - +