Research on MANET Security Architecture Design

被引:2
作者
Li Shi-Chang [1 ]
Yang Hao-Lan [1 ]
Zhu Qing-Sheng [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 630044, Peoples R China
来源
2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS | 2010年
关键词
MANET; security; architecture;
D O I
10.1109/ICSAP.2010.19
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to characteristics of open medium, dynamic topology and distribution, the security of Mobile Ad hoc Network (MANET) is more rigorous than that of traditional network. Referring to the I-ADD process of security analysis, the paper analyzed features, insecurity factors and security threats of MANET. Aiming at the security requirements, the design requirements for network security defense of MANET was brought out. Based on this and referring to OSI hierarchy model, the security architecture was designed. The analysis on relationship between each layer of the architecture and that of OSI was also provided, which offers framework for planning and designing secure and reliable MANET.
引用
收藏
页码:90 / 93
页数:4
相关论文
共 5 条
  • [1] SURVEYING SECURITY ANALYSIS TECHNIQUES IN MANET ROUTING PROTOCOLS
    Andel, Todd R.
    Yasinsac, Alec
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (04): : 70 - 84
  • [2] [Anonymous], P 2 ACM MOB AD HOC N
  • [3] KONG JJ, 2001, P 9 INT C NETW PROT, P1092
  • [4] Proactive key distribution using neighbor graphs
    Mishra, A
    Shin, MH
    Petroni, NL
    Clancy, TC
    Arbaugh, WA
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 26 - 36
  • [5] Swaminatha T M., 2002, Wireless security and privacy: Best practices and design techniques