Skip to main content
Log in

Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad hoc networking has been a hot research topic for a decade or so, and many paradigms have been making use of it. One of these paradigms is the Personal Networks (PN). It is an emerging concept where the user’s personal devices form a virtual network which is secure and private, and reacts to changing environment and context intelligently. A fundamental property of the PN is that personal devices form private multi-hop clusters in an ad hoc manner whenever they come across each other. To this end, this paper presents a pair-wise key based scheme for forming secured private clusters in mobile ad hoc networks. The solution tackles the problem of node authentication combined with traffic encryption in relatively small ad hoc networks using proactive neighbour discovery and authentication. Additionally, the paper proves the feasibility of this solution by means of prototyping and experimental performance analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Muñoz, L., et al. (2005). A proposal for self-organizing networks. In Presented at Wireless World Research Forum Meeting 15 (SIG 3), Paris, December 2005.

  2. Chakeres, I. D., & Perkins, C. E. (2008). Dynamic MANET on-demand routing protocol. IETF Internet Draft, draft-ietf-manet-dymo-16.txt, December 2008 (Work in progress).

  3. Clausen, T., Dearlove, C., & Jacquet, P. (2008). The optimized link state routing protocol version 2. IETF Internet Draft, draft-ietf-manet-olsrv2-07.txt, July 2008 (Work in progress).

  4. Varma, V. K., Ott, M., Pereira, J., & Karlsson, P. (2004). Enabling heterogeneous wireless networking: Technologies and challenges ahead. VTC 2004-Spring Panel Sessions, May 2004.

  5. Gustafsson E., Jonsson A. (2003) Always best connected. IEEE Wireless Communications 10(1): 49–55

    Article  Google Scholar 

  6. Barbir, A., Murphy, S., & Yang, Y. (2006). RFC4593: Generic threats to routing protocols. IETF Network Working Group, October 2006.

  7. Corson, S., & Macker, J. (1999). RFC 2501: Routing protocol performance issues and evaluation considerations. IETF Network Working Group, January 1999.

  8. Papadimitratos P., Haas Z.J. (2003) Secure message transmission in mobile ad hoc networks. Ad hoc Networks Journal, Elsevier 1(1): 193–209

    Article  Google Scholar 

  9. Raffo, D., Adjih, C., Clausen, T., & Mühlethaler, P. (2004). An advanced signature system for OLSR. In Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (pp. 10–16). Washington: ACM Press.

  10. Maughan, D., Schneider, M., Schertler, M., & Turner, J. (1998). Internet security association and key management protocol (ISAKMP). The Internet Society, RFC 2408.

  11. Hu, Y.-C., Perrig, A., & Jonson, D. (2003). Rushing attacks and defense in wireless ad hoc network routing protocols. In Presented at ACM Workshop on Wireless Security (WiSe 2003), San Diego, September 2003.

  12. Hu, Y.-C., Perrig, A., & Jonson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Presented at MobiCom02, September 2002.

  13. Dahill, B., Neil Levine, B., Royer, E., & Shields, C. (2002). A secure routing protocol for ad hoc networks. In Presented at the 10th Conference on Network Protocols (ICNP), November 2002.

  14. Guerrero Zapata, M. (2001). Secure ad hoc on-demand distance vector (SAODV) routing. INTERNET-DRAFT draft-guerrero-manet-saodv-00.txt, August 2001.

  15. Papadimitratos, P., & Haas, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In Presented at the IEEE Workshop on Security and Assurance in Ad hoc Networks, in Conjunction with the 2003 International Symposium on Applications and the Internet, January 2003.

  16. Clausen, T., Dearlove, C., & Dean, J. (2006). MANET neighborhood discovery protocol (NHDP). Mobile ad hoc networking (MANET), draft-ietf-manet-nhdp-00, June 19, 2006.

  17. Kent, S., & Seo, K. (2005). Security architecture for the internet protocol. RFC 4301, December 2005.

  18. Ganzinger, M., Hymas, W., & Schütt, T. (2007). Securing broadcast ad hoc routing protocols. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, March 2007.

  19. Guerrero Zapata, M., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe) (pp. 1–10). San Diego: ACM Press.

  20. Mitchell, C. J., & Schaffelhofer, R. (2004). The personal PKI. In C. J. Mitchell (Ed.), Security for mobility, (Chap. 3, pp. 35–61). London, UK: IEE.

  21. Mirzadeh, S., Tafazolli, R., Jaen-Pallares, J., Armknecth, F., & Afifi, H. (2008). CPFP: An efficient key management scheme for large personal networks. In Proceedings of IEEE ISWPC 2008, May 2008.

  22. Law L., Menezes A., Qu M., Solinas J., Vanstone S. (2003) An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28(2): 119–134

    Article  MATH  MathSciNet  Google Scholar 

  23. Traynor, P., Kumar, R., Bin Saad, H., Cao, G., & La Porta, T. (2006). LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. MobiSys’06, June 2006.

  24. Kettaf N., Abouaissa H., Lorenz P. (2008) An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks. Telecommunication Systems 37(1–3): 29–36

    Article  Google Scholar 

  25. Sanchez, L., Lanza, J., Muñoz, L., & Perez, J. (2005). Enabling secure communications over heterogeneous air interfaces: Building private personal area networks. In Presented at the Wireless Personal Multimedia Communications Conference (WPMC’05), September 2005.

  26. Salim, J., Khosravi, H., Kleen, A., & Kuznetsov, A. (2003). RFC3549: Linux netlink as an IP services protocol. IETF Network Working Group, July 2003.

  27. Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC3561: Ad hoc on-demand distance vector (AODV) routing. IETF Network Working Group, July 2003.

  28. Rawat, A., Vyavahare, P. D., & Ramani, A. K. (2005). Evaluation of rushing attack on secured message transmission (SMT/SRP) protocol for mobile ad hoc networks. In Proceedings of International Conference on Personal Wireless Communications 2005, January 2005.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luis Sánchez.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sánchez, L., Lanza, J., Muñoz, L. et al. Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks. Wireless Pers Commun 52, 393–409 (2010). https://doi.org/10.1007/s11277-008-9655-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9655-2

Keywords

Navigation