Abstract
Mobile ad hoc networking has been a hot research topic for a decade or so, and many paradigms have been making use of it. One of these paradigms is the Personal Networks (PN). It is an emerging concept where the user’s personal devices form a virtual network which is secure and private, and reacts to changing environment and context intelligently. A fundamental property of the PN is that personal devices form private multi-hop clusters in an ad hoc manner whenever they come across each other. To this end, this paper presents a pair-wise key based scheme for forming secured private clusters in mobile ad hoc networks. The solution tackles the problem of node authentication combined with traffic encryption in relatively small ad hoc networks using proactive neighbour discovery and authentication. Additionally, the paper proves the feasibility of this solution by means of prototyping and experimental performance analysis.
Similar content being viewed by others
References
Muñoz, L., et al. (2005). A proposal for self-organizing networks. In Presented at Wireless World Research Forum Meeting 15 (SIG 3), Paris, December 2005.
Chakeres, I. D., & Perkins, C. E. (2008). Dynamic MANET on-demand routing protocol. IETF Internet Draft, draft-ietf-manet-dymo-16.txt, December 2008 (Work in progress).
Clausen, T., Dearlove, C., & Jacquet, P. (2008). The optimized link state routing protocol version 2. IETF Internet Draft, draft-ietf-manet-olsrv2-07.txt, July 2008 (Work in progress).
Varma, V. K., Ott, M., Pereira, J., & Karlsson, P. (2004). Enabling heterogeneous wireless networking: Technologies and challenges ahead. VTC 2004-Spring Panel Sessions, May 2004.
Gustafsson E., Jonsson A. (2003) Always best connected. IEEE Wireless Communications 10(1): 49–55
Barbir, A., Murphy, S., & Yang, Y. (2006). RFC4593: Generic threats to routing protocols. IETF Network Working Group, October 2006.
Corson, S., & Macker, J. (1999). RFC 2501: Routing protocol performance issues and evaluation considerations. IETF Network Working Group, January 1999.
Papadimitratos P., Haas Z.J. (2003) Secure message transmission in mobile ad hoc networks. Ad hoc Networks Journal, Elsevier 1(1): 193–209
Raffo, D., Adjih, C., Clausen, T., & Mühlethaler, P. (2004). An advanced signature system for OLSR. In Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (pp. 10–16). Washington: ACM Press.
Maughan, D., Schneider, M., Schertler, M., & Turner, J. (1998). Internet security association and key management protocol (ISAKMP). The Internet Society, RFC 2408.
Hu, Y.-C., Perrig, A., & Jonson, D. (2003). Rushing attacks and defense in wireless ad hoc network routing protocols. In Presented at ACM Workshop on Wireless Security (WiSe 2003), San Diego, September 2003.
Hu, Y.-C., Perrig, A., & Jonson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Presented at MobiCom02, September 2002.
Dahill, B., Neil Levine, B., Royer, E., & Shields, C. (2002). A secure routing protocol for ad hoc networks. In Presented at the 10th Conference on Network Protocols (ICNP), November 2002.
Guerrero Zapata, M. (2001). Secure ad hoc on-demand distance vector (SAODV) routing. INTERNET-DRAFT draft-guerrero-manet-saodv-00.txt, August 2001.
Papadimitratos, P., & Haas, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In Presented at the IEEE Workshop on Security and Assurance in Ad hoc Networks, in Conjunction with the 2003 International Symposium on Applications and the Internet, January 2003.
Clausen, T., Dearlove, C., & Dean, J. (2006). MANET neighborhood discovery protocol (NHDP). Mobile ad hoc networking (MANET), draft-ietf-manet-nhdp-00, June 19, 2006.
Kent, S., & Seo, K. (2005). Security architecture for the internet protocol. RFC 4301, December 2005.
Ganzinger, M., Hymas, W., & Schütt, T. (2007). Securing broadcast ad hoc routing protocols. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, March 2007.
Guerrero Zapata, M., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe) (pp. 1–10). San Diego: ACM Press.
Mitchell, C. J., & Schaffelhofer, R. (2004). The personal PKI. In C. J. Mitchell (Ed.), Security for mobility, (Chap. 3, pp. 35–61). London, UK: IEE.
Mirzadeh, S., Tafazolli, R., Jaen-Pallares, J., Armknecth, F., & Afifi, H. (2008). CPFP: An efficient key management scheme for large personal networks. In Proceedings of IEEE ISWPC 2008, May 2008.
Law L., Menezes A., Qu M., Solinas J., Vanstone S. (2003) An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28(2): 119–134
Traynor, P., Kumar, R., Bin Saad, H., Cao, G., & La Porta, T. (2006). LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. MobiSys’06, June 2006.
Kettaf N., Abouaissa H., Lorenz P. (2008) An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks. Telecommunication Systems 37(1–3): 29–36
Sanchez, L., Lanza, J., Muñoz, L., & Perez, J. (2005). Enabling secure communications over heterogeneous air interfaces: Building private personal area networks. In Presented at the Wireless Personal Multimedia Communications Conference (WPMC’05), September 2005.
Salim, J., Khosravi, H., Kleen, A., & Kuznetsov, A. (2003). RFC3549: Linux netlink as an IP services protocol. IETF Network Working Group, July 2003.
Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC3561: Ad hoc on-demand distance vector (AODV) routing. IETF Network Working Group, July 2003.
Rawat, A., Vyavahare, P. D., & Ramani, A. K. (2005). Evaluation of rushing attack on secured message transmission (SMT/SRP) protocol for mobile ad hoc networks. In Proceedings of International Conference on Personal Wireless Communications 2005, January 2005.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sánchez, L., Lanza, J., Muñoz, L. et al. Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks. Wireless Pers Commun 52, 393–409 (2010). https://doi.org/10.1007/s11277-008-9655-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9655-2