By Topic

Cluster Based Security Scheme for Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shajin Nargunam, A. ; Dept. of Comput. Sci. & Eng., N.I. Coll. of Eng., Thuckalay ; Sebastian, M.P.

Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. The unique characteristics of mobile ad hoc networks causes a number of nontrivial challenges to security design such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These challenges make a case for building multi-fence security solution that achieves both extensive protection and desirable network performance. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility

Published in:

Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006). IEEE International Conference on

Date of Conference:

19-21 June 2006