Secure communications for cluster-based ad hoc networks using node identities

被引:29
|
作者
Lee, Jung-San [1 ]
Chang, Chin-Chen
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
关键词
ad hoc networks; communications; data integrity; cluster-based; identity;
D O I
10.1016/j.jnca.2006.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network share the responsibility for routing, access, and communications. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes communicating with each other. Such networks are more vulnerable to security threats than traditional wireless networks because of the absence of the fixed infrastructure. For providing secure communications in such networks, lots of mechanisms have been proposed since the early 1990s, which also have to deal with the limitations of the mobile ad hoc networks, including high power saving and low bandwidth. Besides, public key infrastructure (PKI) is a well-known method for providing confidential communications in mobile ad hoc networks. In 2004, Varadharajan et al. proposed a secure communication scheme for cluster-based ad hoc networks based on PKI. Since the computation overheads of the PKI cryptosystem are heavy for each involved communicating node in the cluster, we propose an ID-based version for providing secure communications in ad hoc networks. Without adopting PKI cryptosystems, computation overheads of involved nodes in our scheme can be reduced by 25% at least. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1377 / 1396
页数:20
相关论文
共 50 条
  • [41] Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks
    Wang Anbao
    Zhu Bin
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2013, 1 (01) : 61 - 71
  • [42] Selfish node detection in ad hoc networks based on fuzzy logic
    Homa Hasani
    Shahram Babaie
    Neural Computing and Applications, 2019, 31 : 6079 - 6090
  • [43] Anycast Routing Based on the Node Degree for Ad Hoc and Sensor Networks
    Ohta, Satoru
    Makita, Hiroki
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 439 - 446
  • [44] A Weighted Clustering Algorithm Based on Node Stability for Ad Hoc Networks
    Du, Jianmin
    You, Qidi
    Zhang, Qi
    Xin, Xiangjun
    Tian, Qinghua
    Cao, Guixing
    Liu, Bo
    Zhang, Lijia
    Tao, Ying
    Tian, Feng
    Shen, Yufei
    2017 16TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS & NETWORKS (ICOCN 2017), 2017,
  • [45] Selfish node detection in ad hoc networks based on fuzzy logic
    Hasani, Homa
    Babaie, Shahram
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (10) : 6079 - 6090
  • [46] Connected fixed node degree based topologies in ad hoc networks
    Srivastava, Gaurav
    Boustead, Paul
    Chicharo, Joe
    COMPUTER COMMUNICATIONS, 2006, 29 (09) : 1330 - 1340
  • [47] A Secure Routing Protocol for Cluster-based Wireless Sensor Networks Using ID-based Digital Signature
    Lu, Huang
    Li, Jie
    Kameda, Hisao
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [48] On the cluster based dynamic channel assignment for multihop ad hoc networks
    Hou, TC
    Tsai, TJ
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2002, 4 (01) : 40 - 47
  • [49] Genetically derived secure cluster-based data aggregation in wireless sensor networks
    Bhasker, Lathies
    IET INFORMATION SECURITY, 2014, 8 (01) : 1 - 7
  • [50] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 9023 - 9030