You are not logged in.

Self adjusted security architecture for mobile ad hoc networks (MANETs)

Ghalwash, Atef Z., Youssif, Aliaa A. A., Hashad, Sherif M. and Doss, Robin 2007, Self adjusted security architecture for mobile ad hoc networks (MANETs), in 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, IEEE Computer Society, Los Alamitos, Calif., pp. 682-687.

Attached Files
Name Description MIMEType Size Downloads

Title Self adjusted security architecture for mobile ad hoc networks (MANETs)
Author(s) Ghalwash, Atef Z.
Youssif, Aliaa A. A.
Hashad, Sherif M.
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Conference name International Conference on Computer and Information Science (6th : 2007 : Melbourne, Australia)
Conference location Melbourne, Australia
Conference dates 11-13 July 2007
Title of proceedings 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings
Editor(s) Lee, Roger
Chowdhury, MorshedORCID iD for Chowdhury, Morshed orcid.org/0000-0002-2866-4955
Ray, Sid
Lee, Thuy
Publication date 2007
Conference series International Conference on Computer and Information Science
Start page 682
End page 687
Publisher IEEE Computer Society
Place of publication Los Alamitos, Calif.
Keyword(s) authentication
mobile ad hoc network (MANETs)
certificate authority (CA)
warrant node
Summary In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.
ISBN 0769528414
9780769528410
Language eng
Field of Research 100503 Computer Communications Networks
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2007, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30008086

Document type: Conference Paper
Collection: School of Engineering and Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 598 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 29 Sep 2008, 09:04:23 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.