A secure and resistant architecture against attacks for mobile ad hoc networks

被引:10
|
作者
Rachedi, Abderrezak [1 ]
Benslimane, Abderrahim [1 ]
机构
[1] Univ Avignon, LIA CER1, F-84911 Avignon, France
关键词
MANET; security; distributed PKI; trust model; clustering algorithm;
D O I
10.1002/sec.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new architecture based on an efficient trust model and secure distributed clustering algorithm (SDCA) in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of a fully self-organized security for trust models like pretty good privacy (PGP) adapted to ad hoc technology and the clustering algorithm which is based on the use of trust and mobility metrics, in order to select the clusterhead and to establish a public key infrastructure (PKI) in each cluster for authentication and exchange of data. Furthermore, we present a new approach: the dynamic demilitarized zone (DDMZ) to protect the CA in each cluster. The principal idea of DDMZ consists in selecting the dispensable nodes, also called registration authorities (RAs); these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to the A. With this approach, we can avoid the single point of failure in each cluster. Moreover, we propose a probabilistic model to define the direct connectivity between confident nodes in order to study the resistance degree of the DDMZ against different attacks. In addition, we evaluate the performance of the proposed SDCA and we estimate the robustness and the availability of DDMZ through the simulations. The effects of direct connectivity and transmission range on the stability and security of the network are analyzed. The simulation's results confirm that the proposed architecture is scalable, secure, and more resistant against attacks. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:150 / 166
页数:17
相关论文
共 50 条
  • [31] Masquerading Attacks Detection in Mobile Ad Hoc Networks
    Abbas, Sohail
    Faisal, Mohammad
    Rahman, Haseeb Ur
    Khan, Muhammad Zahid
    Merabti, Madjid
    Khan, Atta Ur Rehman
    IEEE ACCESS, 2018, 6 : 55013 - 55025
  • [32] A Distributed Secure Architecture for Vehicular Ad Hoc Networks
    Gazdar, Tahani
    Belghith, Abdelfettah
    Benslimane, Abderrahim
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (04) : 38 - 63
  • [33] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91
  • [34] A secure location service in mobile ad hoc networks
    Zhou, Z
    Yow, KC
    Nandi, S
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2003, : 274 - 277
  • [35] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [36] Secure node misbehaviors in mobile ad hoc networks
    Chigan, CX
    Bandaru, R
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4730 - 4734
  • [37] Secure data communication in mobile ad hoc networks
    Papadimitratos, P
    Haas, ZJ
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 343 - 356
  • [38] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [39] A confident community to secure Mobile Ad hoc Networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    Guang, Lei
    Assi, Chadi
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1254 - +
  • [40] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):