Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Secure Address Auto-con.guration for Mobile Ad Hoc Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Improving IP address autoconfiguration security in MANETs using trust modelling
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Mobile ad hoc networks - current approaches and future directions
IEEE Network: The Magazine of Global Internetworking
On effective sampling techniques in host-based intrusion detection in tactical MANET
International Journal of Security and Networks
On effective data aggregation techniques in host-based intrusion detection in MANET
International Journal of Security and Networks
Hi-index | 0.00 |
Mobile Ad Hoc Networks (MANETs) are networks with self-organizing capabilities and without a fixed infrastructure. Wireless nodes communicate among themselves using multi-hop radio relaying, without requiring the packets to pass through a central access point or a base station. In a highly mobile and infrastructure-less scenario, pre-configuration of addresses is not possible. Therefore node addresses need to be configured dynamically with minimum delay and packet loss. Existing solutions for IP address auto-configuration do not address security issues. In this paper we propose a secure address auto-configuration for Mobile Ad hoc Networks (MANET) based on Virtual Address Space Mapping [1]. Without any proper authentication mechanism, a malicious node can affect the normal behavior of protocol. Therefore, this approach uses cryptography functions (one-way hash function and symmetric cryptography) to encountering of the all possible address auto-configuration attacks. The scheme uses virtual address space for addressing new nodes joining a network. The aim is to map one point from virtual address sheet to exactly one new node. The reason for using the term "virtual" is that the whole corresponding address space is a 2D flat sheet and each point of this sheet is virtually mapped to a node in MANET. The protocol uses coordinate values for generating addresses. Behavioral simulation had been used for analyzing of the protocol performance.