Construction method of secure tunnels in wireless Ad-Hoc Networks

被引:0
|
作者
Yang, Zhigang [1 ]
Wang, Jiacheng [1 ]
Chen, Wenlong [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020) | 2021年 / 187卷
关键词
Wireless Ad-Hoc network; secure area; secure tunnel; transmission cost;
D O I
10.1016/j.procs.2021.04.042
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Ad-Hoc networks, the transmission data of some secure nodes has the security risk of being monitored by ordinary nodes. Building some encrypted secure tunnels between secure areas is an effective way to ensure transmission security. We mainly study some efficient methods for constructing secure tunnels. First of all, two basic principles of tunnel construction are proposed concerning locations and number of tunnels. Then, four methods of minimizing tunnel construction are designed for different network objects (tunnel links, secure areas, secure nodes and secure traffic) with different network parameter requirements. Finally, the main performance indicators are the suggestions analyzed through experiments, and the suggestions for tunnel construction in different network environments are also proposed. (c) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [31] A better approximation for constructing virtual backbone in 3D wireless ad-hoc networks
    Gao, Xiaofeng
    Li, Jun
    Chen, Guihai
    THEORETICAL COMPUTER SCIENCE, 2015, 607 : 363 - 380
  • [32] Self-stabilizing algorithms of constructing virtual backbone in selfish wireless ad-hoc networks
    Ramtin, Amirreza
    Hakami, Vesal
    Dehghan, Mehdi
    2014 22nd Iranian Conference on Electrical Engineering (ICEE), 2014, : 914 - 919
  • [33] ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    Cao, Zhenfu
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1247 - +
  • [34] Topology Control in Wireless Ad Hoc Networks
    Yadav, Anil
    Singh, Raghuraj
    Shankar, Rama
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 907 - +
  • [35] Core capacity of wireless ad hoc networks
    Rodoplu, V
    Meng, TH
    5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 247 - 251
  • [36] A Review on Secure Communication Protocol for Wireless Ad Hoc Network
    Ingle, Amar S.
    Nimbhorkar, S. U.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [37] Reliable and energy efficient single source broadcasting using network coding in wireless Ad-hoc networks
    Mansouri, H. Shah
    Pakravan, M. R.
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 81 - 85
  • [38] Performance Analysis of the Distributed Coded Non-orthogonal Multiple Access for Wireless Ad-Hoc Networks
    Huang W.
    Li X.
    Yang M.
    Liang Y.
    Wu H.
    Binggong Xuebao/Acta Armamentarii, 2022, 43 (12): : 3082 - 3092
  • [39] Network coding method using heuristic algorithms for wireless ad hoc networks
    Jiao X.-L.
    Wang X.-D.
    Zhou X.-M.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (11): : 2892 - 2905
  • [40] Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network
    Singh, Bharat
    Bansal, Akash
    Kumar, Sunil
    Garg, Anshu
    CONTEMPORARY COMPUTING, PT 2, 2010, 95 : 205 - +