Deakin University
Browse

File(s) under permanent embargo

Self adjusted security architecture for mobile ad hoc networks (MANETs)

conference contribution
posted on 2007-01-01, 00:00 authored by A Ghalwash, A Youssif, S Hashad, Robin Ram Mohan DossRobin Ram Mohan Doss
In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

History

Event

International Conference on Computer and Information Science (6th : 2007 : Melbourne, Australia)

Pagination

682 - 687

Publisher

IEEE Computer Society

Location

Melbourne, Australia

Place of publication

Los Alamitos, Calif.

Start date

2007-07-11

End date

2007-07-13

ISBN-13

9780769528410

ISBN-10

0769528414

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2007, IEEE

Editor/Contributor(s)

R Lee, M Chowdhury, S Ray, T Lee

Title of proceedings

6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings