Construction method of secure tunnels in wireless Ad-Hoc Networks

被引:0
|
作者
Yang, Zhigang [1 ]
Wang, Jiacheng [1 ]
Chen, Wenlong [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020) | 2021年 / 187卷
关键词
Wireless Ad-Hoc network; secure area; secure tunnel; transmission cost;
D O I
10.1016/j.procs.2021.04.042
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Ad-Hoc networks, the transmission data of some secure nodes has the security risk of being monitored by ordinary nodes. Building some encrypted secure tunnels between secure areas is an effective way to ensure transmission security. We mainly study some efficient methods for constructing secure tunnels. First of all, two basic principles of tunnel construction are proposed concerning locations and number of tunnels. Then, four methods of minimizing tunnel construction are designed for different network objects (tunnel links, secure areas, secure nodes and secure traffic) with different network parameter requirements. Finally, the main performance indicators are the suggestions analyzed through experiments, and the suggestions for tunnel construction in different network environments are also proposed. (c) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [21] Routing Algorithm Using Channel Based Hop Counting for Wireless Ad-hoc Networks
    Cho, Byeong Seok
    Lee, Juhyeon
    Park, Hyung-Kun
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 1077 - 1079
  • [22] On the geometrical characteristic of wireless ad-hoc networks and its application in network performance analysis
    Fan, Pingyi
    Li, Guansheng
    Cai, Kai
    Letaief, K. B.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (04) : 1256 - 1264
  • [23] Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad-Hoc Networks
    Bajwa, Shahid Shehzad
    Khan, Muhammad Khalid
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 756 - 760
  • [24] Secure and Robust Localization in a Wireless Ad Hoc Environment
    Misra, Satyajayant
    Xue, Guoliang
    Bhardwaj, Sarvesh
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (03) : 1480 - 1489
  • [25] A Novel Secure Scheme For Wireless Ad Hoc Network
    Yoo, Seung-Jae
    Lee, Dong-Hwi
    Yang, Hwan-Seok
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (02) : 197 - 205
  • [26] A Novel Secure Scheme For Wireless Ad Hoc Network
    Seung-Jae Yoo
    Dong-Hwi Lee
    Hwan-Seok Yang
    Wireless Personal Communications, 2013, 73 : 197 - 205
  • [27] Inter-path Interference Cancelation in Wireless Ad-hoc Networks Using Smart Antennas
    Cikovskis, Lauris
    2014 IEEE 2ND WORKSHOP ON ADVANCES IN INFORMATION, ELECTRONIC AND ELECTRICAL ENGINEERING (AIEEE), 2014,
  • [28] A Density-Aware Location-Aided Routing Protocol for Wireless Ad-hoc Networks
    Huang, Shih-Chang
    Chang, Hong-Yi
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 670 - 673
  • [29] A Method of Control by Telecommunication Airsystems for Wireless AD HOC Networks Optimization
    Lysenko, O. I.
    Valuiskyi, S. V.
    Tachinina, O. M.
    Danylyuk, S. L.
    2015 IEEE 3RD INTERNATIONAL CONFERENCE ACTUAL PROBLEMS OF UNMANNED AERIAL VEHICLES DEVELOPMENTS (APUAVD), 2015, : 182 - 185
  • [30] MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks
    Zhang, Zhengping
    Wang, Jian
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 177 - 181