A secure and resistant architecture against attacks for mobile ad hoc networks

被引:10
|
作者
Rachedi, Abderrezak [1 ]
Benslimane, Abderrahim [1 ]
机构
[1] Univ Avignon, LIA CER1, F-84911 Avignon, France
关键词
MANET; security; distributed PKI; trust model; clustering algorithm;
D O I
10.1002/sec.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new architecture based on an efficient trust model and secure distributed clustering algorithm (SDCA) in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of a fully self-organized security for trust models like pretty good privacy (PGP) adapted to ad hoc technology and the clustering algorithm which is based on the use of trust and mobility metrics, in order to select the clusterhead and to establish a public key infrastructure (PKI) in each cluster for authentication and exchange of data. Furthermore, we present a new approach: the dynamic demilitarized zone (DDMZ) to protect the CA in each cluster. The principal idea of DDMZ consists in selecting the dispensable nodes, also called registration authorities (RAs); these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to the A. With this approach, we can avoid the single point of failure in each cluster. Moreover, we propose a probabilistic model to define the direct connectivity between confident nodes in order to study the resistance degree of the DDMZ against different attacks. In addition, we evaluate the performance of the proposed SDCA and we estimate the robustness and the availability of DDMZ through the simulations. The effects of direct connectivity and transmission range on the stability and security of the network are analyzed. The simulation's results confirm that the proposed architecture is scalable, secure, and more resistant against attacks. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [21] SIP: A secure incentive protocol against selfishness in mobile ad hoc networks
    Zhang, YC
    Lou, WJ
    Fang, YG
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 1679 - 1684
  • [22] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [23] Secure IoT Architecture in Mobile Ad-hoc Network Against Malicious Attacks Using Blockchain-based BATMAN
    Khandelwal, Neha
    Gupta, Hashikant
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (06):
  • [24] Swarm Based Architecture for Defense Against Stealthy Attacks in Mobile Ad Hoc Network
    Ranjan, Abhishek
    Kuthadi, Venu Madhav
    Marwala, Tshilidzi
    Selvaraj, Rajalakshmi
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 36 (1-4) : 107 - 126
  • [25] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Muthumanickam Gunasekaran
    Kandhasamy Premalatha
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [26] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Gunasekaran, Muthumanickam
    Premalatha, Kandhasamy
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [27] Security architecture for the mobile ad hoc networks
    Filipek, Jozef
    Hudec, Ladislav
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2018, 69 (03): : 198 - 204
  • [28] True: A trust evaluation service for mobile ad hoc networks resistant to malicious attacks
    Da Silva, Eduardo
    Misaghi, Mehran
    Albini, Luiz Carlos P.
    Journal of Digital Information Management, 2012, 10 (04): : 262 - 271
  • [29] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [30] A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks
    Borkar, Gautam M.
    Mahajan, A. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) : 23 - 57