A Cluster-Based Security Architecture for Ad Hoc Networks
#1

A Cluster-Based Security Architecture
for Ad Hoc Networks



.pdf   Ad Hoc Networks.pdf (Size: 299.53 KB / Downloads: 4)

Abstract

Secure communication is very important in computer
networks and authentication is one of the most eminent
preconditions. However, common authentication schemes are not
applicable in ad hoc networks because public key infrastructures
with a centralized certification authority are hard to deploy
there. We propose and evaluate a security concept based on a
distributed certification facility. A network is divided into clusters
with one special head node each.

INTRODUCTION

Ad hoc networks are subject to various kinds of attacks.
Wireless communication links can be eavesdropped on without
noticeable effort and communication protocols on all layers
are vulnerable to specific attacks. In contrast to wire-line networks,
known attacks like masquerading, man-in-the-middle,
and replaying of messages can easily be carried out. Moreover,
deploying security mechanisms is difficult due to inherent
properties of ad hoc networks, such as the high dynamics of
their topology (due to mobility and joining/leaving devices),
limited resources of end systems, or bandwidth-restricted and
possibly asymmetrical communication links.

SECURITY IN AD HOC NETWORKS

In a security concept, typically striving for goals like authenticity,
integrity, confidentiality, non-repudiation and availability,
authentication of communicating entities is of particular
importance as it forms the basis for achieving the other security
goals: e.g., encryption is worthless if the communication
partners have not verified their identities before. Authentication
of entities and messages can be realized in different ways
using either symmetric (3DES, AES) or asymmetric (ElGamal,
RSA) cryptographic algorithms (see e.g. [2] for details).

A CLUSTER-BASED CONCEPT FOR
SECURING AD HOC NETWORKS


The security concept described in this section was designed
with the main aim of providing a basis for secure
communication and access control in ad hoc networks. Providing
for secure authentication without relying on single
centralized entities is the most important issue; methods for
ensuring integrity, confidentiality or non-repudiation for endto-
end communication were not considered in detail, as these
can easily be realized using well-known techniques if secure
authentication is possible.

CONCLUSION

In this article, we introduced a cluster-based architecture for
a distributed public key infrastructure that is highly adapted
to the characteristics of ad hoc networks. In order to adapt to
the highly dynamic topology and varying page link qualities in ad
hoc networks, we consequently avoided any central instances
that would form single points of attack and failure. Instead,
the ad hoc network was divided into clusters, and the cluster
heads jointly perform the tasks of a certification authority.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: content security cluster solution, ppt ad hoc network architecture diagram, security issues in mobile ad hoc networks, ad hoc architecture, security in ad hoc wireless networks pdf, security architecture, information security architecture,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,705 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,946 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,895 07-10-2016, 09:02 AM
Last Post: ijasti
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,834 14-07-2015, 02:24 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,772 27-04-2015, 01:48 PM
Last Post: seminar report asees
  Computer Architecture Requirements? shakir_ali 1 27,340 07-04-2015, 12:04 PM
Last Post: Kishore1
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,574 26-02-2015, 08:03 PM
Last Post: Guest
  Computer Architecture ACS Project? shakir_ali 0 7,527 30-10-2014, 12:01 AM
Last Post: shakir_ali
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,330 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,037 30-03-2014, 04:40 AM
Last Post: Guest

Forum Jump: