Abstract
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metric, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present new approach Dynamic Demilitarized Zone (DDMZ) to protect CA in each cluster. The principle idea of DDMZ consists to select the dispensable nodes, also called registration authorities; these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to CA. With this approach, we can avoid the single point of failure in each cluster. This architecture can be easily extended to other hierarchical routing protocols. Simulation results confirm that our architecture is scalable and secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zimmermann, P.R.: The official PGP user’s guide. MIT Press, Cambridge (1995)
Capkun, S., Buttyan, L., Hubaux, J.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. In: ACM International Workshop on Wireless Security, WiSe, vol. 2, pp. 52–64 (2002)
Basu, P., Khan, N., Little, T.: A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of Distributed Computing Systems Workshop, pp. 43–51 (2001)
Rachedi, A., Benslimane, A.: A Hiearchical Distributed Architecture to Secure Ad-Hoc Networks. Research Technical Report LIA (2006)
Gerla, M., Tsai, J.T.-C.: SMulticluster, Mobile Multimedia Radio Networks. Wireless Networks, 255–256 (1995)
Yi, S., Kravets, R.: Quality of Authentication in Ad Hoc Networks. In: MobiCom 2004. ACM, New York (2004)
Inn Er, I., Winston, K.G.: seah. Mobility-based d-hop Clustering Algorithm for Mobile Ad Hoc Networks (2004)
Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Peer-to-Peer Security. IEEE Transactions on Mobile Computing 5, 48–60 (2006)
Chiang, C., Wu, H., Liu, W., Gerla, M.: Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel. In: IEEE Proceedings of SICON 1997, pp. 197–211 (1997)
Gerla, M., Tsai, J.T.-C.: Multicluster, Mobile Multimedia Radio Networks. Wireless Networks, 255–256 (1995)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13, 24–30 (1999)
Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A Cluster-Based Security Architecture for Ad Hoc Networks. In: INFOCOM 2004 (2004)
Sanzgiri, K., Dahill, B., LaFlamme, D., Levine, B.N., Shields, C., Belding-Royer, E.M.: An Authenticated Routing Protocol for Secure Ad Hoc Networks. Selected Areas in Communication (JSAC) 23, 598–610 (2005)
UC Berkeley and USC ISI: The network simulator ns-2. Part of the VINT project (1998), Available from: http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rachedi, A., Benslimane, A. (2006). A Secure Architecture for Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_36
Download citation
DOI: https://doi.org/10.1007/11943952_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49932-9
Online ISBN: 978-3-540-49933-6
eBook Packages: Computer ScienceComputer Science (R0)