Construction method of secure tunnels in wireless Ad-Hoc Networks

被引:0
|
作者
Yang, Zhigang [1 ]
Wang, Jiacheng [1 ]
Chen, Wenlong [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
关键词
Wireless Ad-Hoc network; secure area; secure tunnel; transmission cost;
D O I
10.1016/j.procs.2021.04.042
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Ad-Hoc networks, the transmission data of some secure nodes has the security risk of being monitored by ordinary nodes. Building some encrypted secure tunnels between secure areas is an effective way to ensure transmission security. We mainly study some efficient methods for constructing secure tunnels. First of all, two basic principles of tunnel construction are proposed concerning locations and number of tunnels. Then, four methods of minimizing tunnel construction are designed for different network objects (tunnel links, secure areas, secure nodes and secure traffic) with different network parameter requirements. Finally, the main performance indicators are the suggestions analyzed through experiments, and the suggestions for tunnel construction in different network environments are also proposed. (c) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [31] Covert channels in ad-hoc wireless networks
    Li, Song
    Ephremides, Anthony
    AD HOC NETWORKS, 2010, 8 (02) : 135 - 147
  • [32] Spatial reuse in wireless ad-hoc networks
    Guo, XG
    Roy, S
    Conner, WS
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 1437 - 1442
  • [33] Evaluating connectivity in wireless ad-hoc networks
    Vargas-Rosales, C
    Lopez, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3613 - 3617
  • [34] Optimal design of wireless ad-hoc networks
    Wu, SY
    Anandialingam, G
    TELECOMMUNICATIONS NETWORK DESIGN AND MANAGEMENT, 2003, 23 : 47 - 64
  • [35] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [36] MAC schemes for ad-hoc wireless networks
    Loscri, V.
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 36 - 40
  • [37] Stealth attacks on ad-hoc wireless networks
    Jakobsson, M
    Wetzel, S
    Yener, B
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2103 - 2111
  • [38] On network coding in wireless ad-hoc networks
    Zhang, Jingyao
    Fan, Pingyi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 140 - 148
  • [39] No Regret Routing for Ad-hoc Wireless Networks
    Bhorkar, A. A.
    Javidi, T.
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 676 - 680
  • [40] Frequency Coordination in Wireless Ad-Hoc Networks
    Ellingsaeter, Brage
    Maseng, Torleiv
    2011 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2011,