File(s) under permanent embargo
Self adjusted security architecture for mobile ad hoc networks (MANETs)
conference contribution
posted on 2007-01-01, 00:00 authored by A Ghalwash, A Youssif, S Hashad, Robin Ram Mohan DossRobin Ram Mohan DossIn this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.
History
Event
International Conference on Computer and Information Science (6th : 2007 : Melbourne, Australia)Pagination
682 - 687Publisher
IEEE Computer SocietyLocation
Melbourne, AustraliaPlace of publication
Los Alamitos, Calif.Start date
2007-07-11End date
2007-07-13ISBN-13
9780769528410ISBN-10
0769528414Language
engPublication classification
E1 Full written paper - refereedCopyright notice
2007, IEEEEditor/Contributor(s)
R Lee, M Chowdhury, S Ray, T LeeTitle of proceedings
6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedingsUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC