An Integrated Security Framework for Access Control and Address Auto-Configuration for MANETs
Loading...
Date
2016
Authors
Journal Title
Journal ISSN
Volume Title
Type
Conference Paper
Publisher
Institute of Electrical and Electronics Engineers Inc.
Series Info
Proceedings - 2015 8th IFIP Wireless and Mobile Networking Conference, WMNC 2015
Scientific Journal Rankings
Abstract
As mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in MANET security focused on secure routing and key management. In this paper, we propose an access control mechanism with features that is inherited to produce a secure address auto-configuration scheme providing a framework that guarantee access control and secure address auto-configuration for MANET nodes utilizing the concepts of identity-based cryptography and threshold secret sharing. Our mechanism provides key management service without any assumption of a prefixed trust relationship between nodes, which effectively resolves the problem of single point of failure in the traditional public key infrastructure. Simulations showed that the proposed architecture enhance QoS level compared to the existing approaches that aims to provide only access control or address auto-configuration separately. With a similar or a lower cost, our integrated approach enhanced MANET security and performance. � 2015 IEEE.
Description
Scopus
Keywords
October University for Modern Sciences and Arts, University for Modern Sciences and Arts, MSA University, جامعة أكتوبر للعلوم الحديثة والآداب, Access control, Address auto-configuration, Identity-based cryptography, MANET, Access control, Cryptography, Distributed computer systems, Mobile security, Mobile telecommunication systems, Public key cryptography, Telecommunication networks, Access control mechanism, Auto-configuration, Identity based cryptography, MANET, Mobile adhoc network (MANETs), Proposed architectures, Public key infrastructure, Threshold secret sharing, Mobile ad hoc networks