A secure and resistant architecture against attacks for mobile ad hoc networks

被引:10
|
作者
Rachedi, Abderrezak [1 ]
Benslimane, Abderrahim [1 ]
机构
[1] Univ Avignon, LIA CER1, F-84911 Avignon, France
关键词
MANET; security; distributed PKI; trust model; clustering algorithm;
D O I
10.1002/sec.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new architecture based on an efficient trust model and secure distributed clustering algorithm (SDCA) in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of a fully self-organized security for trust models like pretty good privacy (PGP) adapted to ad hoc technology and the clustering algorithm which is based on the use of trust and mobility metrics, in order to select the clusterhead and to establish a public key infrastructure (PKI) in each cluster for authentication and exchange of data. Furthermore, we present a new approach: the dynamic demilitarized zone (DDMZ) to protect the CA in each cluster. The principal idea of DDMZ consists in selecting the dispensable nodes, also called registration authorities (RAs); these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to the A. With this approach, we can avoid the single point of failure in each cluster. Moreover, we propose a probabilistic model to define the direct connectivity between confident nodes in order to study the resistance degree of the DDMZ against different attacks. In addition, we evaluate the performance of the proposed SDCA and we estimate the robustness and the availability of DDMZ through the simulations. The effects of direct connectivity and transmission range on the stability and security of the network are analyzed. The simulation's results confirm that the proposed architecture is scalable, secure, and more resistant against attacks. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [1] A secure architecture for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 424 - +
  • [2] Secure cooperative mobile ad hoc networks against injecting traffic attacks
    Yu, W
    Liu, KJR
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 55 - 64
  • [3] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [4] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503
  • [5] Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
    Chen, Ruiliang
    Snow, Michael
    Park, Jung-Min
    Refaei, M. Tamer
    Eltoweissy, Mohamed
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [6] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    Poongodi, T.
    Karthikeyan, M.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1039 - 1050
  • [7] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    T. Poongodi
    M. Karthikeyan
    Wireless Personal Communications, 2016, 90 : 1039 - 1050
  • [8] Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 31 - 40
  • [9] Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks
    Elmahdi, Elbasher
    Yoo, Seong-Moo
    Sharshembiev, Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [10] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,