Construction method of secure tunnels in wireless Ad-Hoc Networks

被引:0
|
作者
Yang, Zhigang [1 ]
Wang, Jiacheng [1 ]
Chen, Wenlong [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020) | 2021年 / 187卷
关键词
Wireless Ad-Hoc network; secure area; secure tunnel; transmission cost;
D O I
10.1016/j.procs.2021.04.042
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Ad-Hoc networks, the transmission data of some secure nodes has the security risk of being monitored by ordinary nodes. Building some encrypted secure tunnels between secure areas is an effective way to ensure transmission security. We mainly study some efficient methods for constructing secure tunnels. First of all, two basic principles of tunnel construction are proposed concerning locations and number of tunnels. Then, four methods of minimizing tunnel construction are designed for different network objects (tunnel links, secure areas, secure nodes and secure traffic) with different network parameter requirements. Finally, the main performance indicators are the suggestions analyzed through experiments, and the suggestions for tunnel construction in different network environments are also proposed. (c) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [1] A secure communication protocol for ad-hoc wireless sensor networks
    Pearce, C
    Ma, VYM
    Bertok, P
    PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2004, : 79 - 84
  • [2] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [3] Anonymous secure communication in wireless mobile ad-hoc networks
    Rahman, Sk. Md. Mizanur
    Inomata, Atsuo
    Okamoto, Takeshi
    Mambo, Masahiro
    Okamoto, Eiji
    UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 140 - +
  • [4] Publish/subscribe tree construction in wireless ad-hoc networks
    Huang, YQ
    Garcia-Molina, H
    MOBILE DATA MANAGEMENT, PROCEEDINGS, 2003, 2574 : 122 - 140
  • [5] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Shimada, Isamu
    Higaki, Hiroaki
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 700 - 705
  • [6] A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
    Javed, Muhammad Saqib
    Abu Bakar, Rana
    IEEE ACCESS, 2024, 12 : 194989 - 195004
  • [7] A secure VLAN construction protocol in wireless ad hoc networks
    Wang, TI
    Yeh, CH
    Huang, YM
    ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 68 - 72
  • [8] Secure transmission in wireless ad-hoc networks without CSI at the destination
    He, Hongliang
    Li, Xingmei
    AD HOC NETWORKS, 2024, 152
  • [9] Ad-hoc networks and layer 2 tunnels
    Baloch, F
    Strandmark, C
    Muralidhran, S
    Bhagavathula, R
    Pendse, R
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 5040 - 5043
  • [10] Throughput Maximization for Multipath Secure Transmission in Wireless Ad-Hoc Networks
    Bai, Lin
    Han, Pengfei
    Wang, Jingjing
    Wang, Jiaxing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (11) : 6810 - 6821