Skip to main content

A Secure Architecture for Mobile Ad Hoc Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4325))

Included in the following conference series:

Abstract

In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metric, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present new approach Dynamic Demilitarized Zone (DDMZ) to protect CA in each cluster. The principle idea of DDMZ consists to select the dispensable nodes, also called registration authorities; these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to CA. With this approach, we can avoid the single point of failure in each cluster. This architecture can be easily extended to other hierarchical routing protocols. Simulation results confirm that our architecture is scalable and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zimmermann, P.R.: The official PGP user’s guide. MIT Press, Cambridge (1995)

    Google Scholar 

  2. Capkun, S., Buttyan, L., Hubaux, J.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. In: ACM International Workshop on Wireless Security, WiSe, vol. 2, pp. 52–64 (2002)

    Google Scholar 

  3. Basu, P., Khan, N., Little, T.: A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of Distributed Computing Systems Workshop, pp. 43–51 (2001)

    Google Scholar 

  4. Rachedi, A., Benslimane, A.: A Hiearchical Distributed Architecture to Secure Ad-Hoc Networks. Research Technical Report LIA (2006)

    Google Scholar 

  5. Gerla, M., Tsai, J.T.-C.: SMulticluster, Mobile Multimedia Radio Networks. Wireless Networks, 255–256 (1995)

    Google Scholar 

  6. Yi, S., Kravets, R.: Quality of Authentication in Ad Hoc Networks. In: MobiCom 2004. ACM, New York (2004)

    Google Scholar 

  7. Inn Er, I., Winston, K.G.: seah. Mobility-based d-hop Clustering Algorithm for Mobile Ad Hoc Networks (2004)

    Google Scholar 

  8. Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Peer-to-Peer Security. IEEE Transactions on Mobile Computing 5, 48–60 (2006)

    Article  Google Scholar 

  9. Chiang, C., Wu, H., Liu, W., Gerla, M.: Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel. In: IEEE Proceedings of SICON 1997, pp. 197–211 (1997)

    Google Scholar 

  10. Gerla, M., Tsai, J.T.-C.: Multicluster, Mobile Multimedia Radio Networks. Wireless Networks, 255–256 (1995)

    Google Scholar 

  11. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13, 24–30 (1999)

    Article  Google Scholar 

  12. Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A Cluster-Based Security Architecture for Ad Hoc Networks. In: INFOCOM 2004 (2004)

    Google Scholar 

  13. Sanzgiri, K., Dahill, B., LaFlamme, D., Levine, B.N., Shields, C., Belding-Royer, E.M.: An Authenticated Routing Protocol for Secure Ad Hoc Networks. Selected Areas in Communication (JSAC) 23, 598–610 (2005)

    Article  Google Scholar 

  14. UC Berkeley and USC ISI: The network simulator ns-2. Part of the VINT project (1998), Available from: http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rachedi, A., Benslimane, A. (2006). A Secure Architecture for Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_36

Download citation

  • DOI: https://doi.org/10.1007/11943952_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49932-9

  • Online ISBN: 978-3-540-49933-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics