Secure communications for cluster-based ad hoc networks using node identities

被引:29
|
作者
Lee, Jung-San [1 ]
Chang, Chin-Chen
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
关键词
ad hoc networks; communications; data integrity; cluster-based; identity;
D O I
10.1016/j.jnca.2006.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network share the responsibility for routing, access, and communications. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes communicating with each other. Such networks are more vulnerable to security threats than traditional wireless networks because of the absence of the fixed infrastructure. For providing secure communications in such networks, lots of mechanisms have been proposed since the early 1990s, which also have to deal with the limitations of the mobile ad hoc networks, including high power saving and low bandwidth. Besides, public key infrastructure (PKI) is a well-known method for providing confidential communications in mobile ad hoc networks. In 2004, Varadharajan et al. proposed a secure communication scheme for cluster-based ad hoc networks based on PKI. Since the computation overheads of the PKI cryptosystem are heavy for each involved communicating node in the cluster, we propose an ID-based version for providing secure communications in ad hoc networks. Without adopting PKI cryptosystems, computation overheads of involved nodes in our scheme can be reduced by 25% at least. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1377 / 1396
页数:20
相关论文
共 50 条
  • [31] A cluster based mobility prediction scheme for ad hoc networks
    Dekar, Lyes
    Kheddouci, Hamamache
    AD HOC NETWORKS, 2008, 6 (02) : 168 - 194
  • [32] A Cluster-based QoS Support To Bandwidth Preservation With Concept Of Survivability In Multi-hop Mobile Ad Hoc Networks
    Pattanayak, Binod Kumar
    Mishra, Manoj Kumar
    Jagadev, Alok Kumar
    Nayak, Manoj Ranjan
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 247 - 254
  • [33] Cluster-based combined hybrid relay vehicle selection approach for improving performance and reliability in vehicular ad hoc networks
    Padiya, Puja
    Vidhate, Amarsinh
    Vasappanavara, Ramesh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (05) : 532 - 554
  • [34] Multipath routing based secure data transmission in ad hoc networks
    Zhao, Li
    Delgado-Frias, Jose G.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 17 - +
  • [35] UGSP: Authentication based secure protocol for ad-hoc networks
    Arora, Neelima
    Shyamasundar, R. K.
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 233 - +
  • [36] Secure Routing Algorithm Based On Trust Value for Ad Hoc Networks
    Wang, Li
    Wang, Qingwen
    Zhang, Haijing
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016), 2016, 56 : 127 - 131
  • [37] Secure Route Selection Based on Trust Territories for Ad Hoc Networks
    Bai, Zhongying
    Bai, Yuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4388 - +
  • [38] Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    Kasahara, Shoji
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 99 - 114
  • [39] Detecting node misbehavior in ad hoc networks
    Refaei, M. Tamer
    Rong, Yanxia
    DaSilva, Luiz A.
    Choi, Hyeong-Ah
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3425 - +
  • [40] Realize node localization based on OLSR protocol in Ad Hoc networks
    Anbao W.
    Bin Z.
    International Journal of Networked and Distributed Computing, 2013, 1 (1) : 61 - 71