An Integrated Security Framework for Access Control and Address Auto-Configuration for MANETs

dc.AffiliationOctober University for modern sciences and Arts (MSA)
dc.contributor.authorZakaria E.E.
dc.contributor.authorHamza H.S.
dc.contributor.authorSaroit I.A.
dc.contributor.otherFaculty of Computers and Information Sciences
dc.contributor.otherMSA University
dc.contributor.otherGiza
dc.contributor.otherEgypt; Department of Information Technology
dc.contributor.otherFaculty of Computers and Information Sciences
dc.contributor.otherCairo University
dc.contributor.otherCairo
dc.contributor.otherEgypt
dc.date.accessioned2020-01-09T20:41:39Z
dc.date.available2020-01-09T20:41:39Z
dc.date.issued2016
dc.descriptionScopus
dc.description.abstractAs mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in MANET security focused on secure routing and key management. In this paper, we propose an access control mechanism with features that is inherited to produce a secure address auto-configuration scheme providing a framework that guarantee access control and secure address auto-configuration for MANET nodes utilizing the concepts of identity-based cryptography and threshold secret sharing. Our mechanism provides key management service without any assumption of a prefixed trust relationship between nodes, which effectively resolves the problem of single point of failure in the traditional public key infrastructure. Simulations showed that the proposed architecture enhance QoS level compared to the existing approaches that aims to provide only access control or address auto-configuration separately. With a similar or a lower cost, our integrated approach enhanced MANET security and performance. � 2015 IEEE.en_US
dc.description.sponsorshipIEEE Communication Society;IFIP TC6;University of Koblenz-Landauen_US
dc.description.urihttps://www.scimagojr.com/journalsearch.php?q=21100456753&tip=sid&clean=0
dc.identifier.doihttps://doi.org/10.1109/WMNC.2015.18
dc.identifier.doiPubMed ID :
dc.identifier.isbn9.78E+12
dc.identifier.otherhttps://doi.org/10.1109/WMNC.2015.18
dc.identifier.otherPubMed ID :
dc.identifier.urihttps://t.ly/rxr3X
dc.language.isoEnglishen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofseriesProceedings - 2015 8th IFIP Wireless and Mobile Networking Conference, WMNC 2015
dc.subjectOctober University for Modern Sciences and Arts
dc.subjectUniversity for Modern Sciences and Arts
dc.subjectMSA University
dc.subjectجامعة أكتوبر للعلوم الحديثة والآداب
dc.subjectAccess controlen_US
dc.subjectAddress auto-configurationen_US
dc.subjectIdentity-based cryptographyen_US
dc.subjectMANETen_US
dc.subjectAccess controlen_US
dc.subjectCryptographyen_US
dc.subjectDistributed computer systemsen_US
dc.subjectMobile securityen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectPublic key cryptographyen_US
dc.subjectTelecommunication networksen_US
dc.subjectAccess control mechanismen_US
dc.subjectAuto-configurationen_US
dc.subjectIdentity based cryptographyen_US
dc.subjectMANETen_US
dc.subjectMobile adhoc network (MANETs)en_US
dc.subjectProposed architecturesen_US
dc.subjectPublic key infrastructureen_US
dc.subjectThreshold secret sharingen_US
dc.subjectMobile ad hoc networksen_US
dc.titleAn Integrated Security Framework for Access Control and Address Auto-Configuration for MANETsen_US
dc.typeConference Paperen_US
dcterms.isReferencedByAbdelmalek, A., Feham, M., Taleb-Ahmed, A., On recent security enhancements to auto-configuration protocols for MANETs real threats and requirements (2009) IJCSNS International Journal of Computer Science and Network Security, 9 (4). , April; Langer, A., Kuhnert, T., (2007) Security Issues in Address Autoconfiguration Protocols: An Improved Version of the Optimized Dynamic Address Configuration Protocol, , archiv. tu-chemnitz. de; Bernardos, C., Calderon, M., Moustafa, H., (2008) Survey of IP Address Auto-configuration Mechanisms for MANETs, , draft-bernardosmanet-autoconf-survey-03, April; Baccelli, E., Address auto-configuration for MANET: Terminology and problem state ment (2008) Draft-ietf-autoconfstatement-04, February; Kim, Y., Mazzocchi, D., Tsudik, G., Admission control in peer groups (2003) IEEE International Symposium on Network Computing and Applications (NCA), , Apr; Zhou, L., Haas, Z.J., Securing ad hoc networks (1999) IEEE Network, 13 (6), pp. 24-30; Shamir, A., How to share a secret (1979) Communications of the ACM, 22 (11), pp. 612-613; Saxena, N., Tsudik, G., Yi, J.H., Access control in ad hoc groups (2004) International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P), , Oct; Saxena, N., Tsudik, G., Yi, J.H., Threshold cryptography in P2P and MANETs: The case of access control (2007) International Journal of Computer and Telecommunications Networking, 51 (12), pp. 3632-3649. , Aug; Kong, J., Lou, H., Xu, K., Gu, D.L., Gerla, M., Lu, S., Adaptive security for multi-level ad-hoc networks (2002) Journal of Wireless Communications and Mobile Computing (WCMC), 2, pp. 533-547; Kong, J., Zerfos, P., Lou, H., Lu, S., Zhang, L., Providing robust and ubiquitous security support for MANET (2001) IEEE International Conference on Network Protocols (ICNP); Lou, H., Kong, J., Zerfos, P., Lu, S., Zhang, L., URSA: Ubiquitous and robust access control for mobile ad hoc networks (2004) IEEE/ACM Transactions on Networking, 12 (6), pp. 1049-1063. , Dec; Saxena, N., Tsudik, G., Yi, J.H., Identity-based access control for Ad Hoc groups (2004) International Conference on Information Security and Cryptology (ICISC), , Dec; Misra, A., Das, S., McAuley, A., Das, S.K., Sun. Autoconfiguration, registration and mobility management for pervasive computing (2001) IEEE Personal Communications, 8 (4). , Aug; Mohsin, M., Prakash, R., IP address assignment in a mobile ad hoc network (2002) IEEE Milcom; Nesargi, S., Prakash, R., MANETconf: Configuration of hosts in a mobile ad hoc network (2002) IEEE INFOCOM 2002, , June; Zhou, H., Ni, L., Mutka, M., Prophet address allocation for large scale MANETs (2003) Proceedings of INFOCOM 2003; Perkins, C., Malinen, J., Wakikawa, R., Belding-Royer, E., Sun, Y., (2001) IP Address Auto-configuration for Ad Hoc Networks, , draft ietfmanetautoconf-01. txt, November; Weniger, K., PACMAN: Passive auto-configuration for mobile ad hoc networks (2005) IEEE JSAC, Special Issue on Wireless Ad Hoc Networks, , Mar; Vaidya, N., Weak duplicate address detection in mobile ad hoc networks (2002) Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking AnComputing, , Lausanne, Switzerland; Cavalli, A., Orset, J., Secure hosts auto-configuration in mobile ad hoc networks (2004) ICDCSW, pp. 809-814; Buiati, F., Puttini, R.S., De Sousa, R.T., Jr., A secure autoconfiguration protocol for MANET nodes (2004) Lecture Notes in Computer Science, 3158, pp. 108-121; Wang, P., Reeves, D.S., Ning, P., Secure address autoconfiguration for mobile ad hoc networks (2005) MOBIQUITOUS, pp. 519-522; Hu, S., Mitchell, C.J., Improving IP address autoconfiguration security in MANETs using trust modelling (2005) Mobile Ad-hoc and Sensor Networks-First International Conference, pp. 83-92. , MSN; Johnson, D.B., Maltz, D.A., Dynamic source routing in ad hoc wireless networks (1996) Mobile Computing, 353, pp. 153-181. , T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer; Yang, H., Meng, X., Lu, S., Self-organized network layer security in mobile ad hoc networks (2002) Proc. 1st ACM Workshop on Wireless Security (WiSe), pp. 11-20; Pedersen, T.P., A threshold cryptosystem without a trusted party (1991) EUROCRYPT; Fall, K., Varadhan, K., Ns manual The VINT Project; Perkins, C., Belding-Royer, E., Das, S., Ad hoc on-demand distance vector (AODV) routing (2003) RFC, 3561. , July; Jourabbaf, N.A., Movaghar, ID-NAC: Identity-based network access control for MANETs (2008) 16th IEEE International Conference on Networks, 2008. ICon, pp. 1-6; Zhang, Y., Liu, W., Lou, W., Fang, Y., Securing mobile ad hoc networks with certificateless public keys (2006) IEEE Transactions on Dependable and Secure Computing, 3 (4), pp. 386-399; Wang, P., Reeves, D.S., Ning, P., Secure address autoconfiguration for mobile ad hoc networks (2005) Proceedings of 2nd Annual International Conference MobiQuitous, pp. 519-522; Ghosh, U., Datta, R., AdIP: An improved authenticated dynamic IP configuration scheme for mobile ad hoc networks (2009) Int. J. Ultra Wideband Communications and Systems, 1, pp. 102-117; Ghosh, U., Datta, R., A secure dynamic IP configuration scheme for mobile ad hoc networks (2011) Ad Hoc Networks, 9 (7), pp. 1327-1342
dcterms.sourceScopus

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
avatar_scholar_256.png
Size:
6.31 KB
Format:
Portable Network Graphics
Description: