By Topic

Contextual mobility profiling secure routing infrastructure for Mobile Ad-hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shaftab Ahmad ; Bahria University, Islamabad, Pakistan ; Syed Zubair Ahmad

Mobile ad-hoc networks (MANET) have found strategic importance in real world applications like environment management, remote explorations, disaster and warfare conditions due to their dynamic, self tailoring and adaptive nature. These networks can be quickly deployed in situations where no infrastructure exists. Effective use of these networks is largely dependent on secure and reliable behavior of participating nodes as they are also used for routing and forwarding services. A number of strategies have been proposed to handle security issues in MANET. The key distribution mechanism under such protocols can be improved by adding the dimension of profile-based selection of participating nodes. This paper presents mobility profile driven security architecture for identifying candidate nodes for PKI deployment in MANET. The mobility profiles of nodes can be differentiated between those confined to small area from nodes having high mobility and varying signal / link conditions. The distributed information is used to identify relative stationary or peering node points that collaborate to generate a dynamic knowledge base. The profiles are exchanged between peering nodes as beacons along with routing updates. The wireless domain is thus monitored to locate unpredictable behavior and improve security management over ad-hoc networks. The conceptual phase of the method is now under test on ns2 simulator.

Published in:

2006 International Symposium on High Capacity Optical Networks and Enabling Technologies

Date of Conference:

6-8 Sept. 2006