Construction method of secure tunnels in wireless Ad-Hoc Networks

被引:0
|
作者
Yang, Zhigang [1 ]
Wang, Jiacheng [1 ]
Chen, Wenlong [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020) | 2021年 / 187卷
关键词
Wireless Ad-Hoc network; secure area; secure tunnel; transmission cost;
D O I
10.1016/j.procs.2021.04.042
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Ad-Hoc networks, the transmission data of some secure nodes has the security risk of being monitored by ordinary nodes. Building some encrypted secure tunnels between secure areas is an effective way to ensure transmission security. We mainly study some efficient methods for constructing secure tunnels. First of all, two basic principles of tunnel construction are proposed concerning locations and number of tunnels. Then, four methods of minimizing tunnel construction are designed for different network objects (tunnel links, secure areas, secure nodes and secure traffic) with different network parameter requirements. Finally, the main performance indicators are the suggestions analyzed through experiments, and the suggestions for tunnel construction in different network environments are also proposed. (c) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [41] Customized Distribution Automation System based on Wireless Ad-hoc Network
    Zhou, Yixin
    Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 : 919 - 922
  • [42] Mobile cluster protocol in wireless ad hoc networks
    Liu, K
    Li, JD
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 568 - 573
  • [43] Mobile backbone synthesis for ad hoc wireless networks
    Ju, Huei-jiun
    Rubin, Zhak
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (12) : 4285 - 4298
  • [44] A Perturbation-Proof Self-stabilizing Algorithm for Constructing Virtual Backbones in Wireless Ad-Hoc Networks
    Ramtin, Amirreza
    Hakami, Vesal
    Dehghan, Mehdi
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 66 - 76
  • [45] New Results on the Connectivity in Wireless Ad Hoc Networks
    Chang, Min-Kuan
    Shen, Che-Ann
    Chuang, Min-Han
    2012 IEEE 75TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2012,
  • [46] Multipath Source Routing in wireless ad hoc networks
    Wang, L
    Zhang, LF
    Shu, YT
    Dong, M
    Yang, OWW
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 479 - 483
  • [47] PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks
    Deng, Der-Jiunn
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1468 - 1473
  • [48] A fast local search method for minimum energy broadcast in wireless ad hoc networks
    Bauer, Joanna
    Haugland, Dag
    Yuan, Di
    OPERATIONS RESEARCH LETTERS, 2009, 37 (02) : 75 - 79
  • [49] A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks
    Jiang, Ning
    Hua, Kien A.
    Liu, Danzhou
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2007, 9 (01) : 56 - 66
  • [50] Improved Approximation Bounds for Maximum Lifetime Problems in Wireless Ad-Hoc Network
    Lee, Sang Hyuk
    Radzik, Tomasz
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, 2012, 7363 : 14 - 27