skip to main content
10.1145/2185216.2185306acmconferencesArticle/Chapter ViewAbstractPublication PagesacwrConference Proceedingsconference-collections
research-article

Performance evaluation of key exchange using integrity regions in different mobility models

Authors Info & Claims
Published:18 December 2011Publication History

ABSTRACT

Key exchange in MANETs has been a challenging issue in current situations, because of rapid increasing of mobile devices. In such environment secure information sharing is very essential for users. This work has been trying to evaluate the performance of key exchange scheme using integrity regions in two mobility models. The simulation results show the performance of key exchange scheme using Integrity region. This paper is thus trying to find the better real time scenario for key exchange using paramount integrity region radius.

References

  1. IEEE Std 802.11i/d3.0. Available at http://www.cs.umd.edu/mhshin/doc/802.11/802.11i-D3.0.pdf. {10} Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In 8th ACM International Conference on Mobile Computing and Networking, pages 12{23, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. _Capkun and M. _Cagalj, "Integrity Regions: Authentication through Presence in Wireless Networks," IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 11, NOVEMBER 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Bai, N. Sadagopan, and A. Helmy, Important: a framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks, in A Survey of MobIlity Models 29 Proceedings of IEEE Information Communications Conference (INFOCOM 2003), San Francisco, Apr. 2003.Google ScholarGoogle Scholar
  4. Random Waypoint Mobility Model in Cellular Networks Esa Hyytiä_ and Jorma VirtamoPublished in: Journal Wireless Networks, Volume 13 Issue2, April 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, volume 353, pages 153--181. Kluwer Academic Publishers, 1996. Chapter 5.Google ScholarGoogle Scholar
  6. {BRS03} Christian Bettstetter, Giovanni Resta, and Paolo Santi. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing, 2(3):257--269, July--September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Bettstetter and C. Wagner. The spatial node distribution of the random waypoint mobility model. In Proceedings of German Workshop on Mobile Ad Hoc networks (WMAN), Ulm, Germany, March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Esa Hyytiä, Pasi Lassila, Laura Nieminen, and Jorma Virtamo. Spatial node distribution in the random waypoint mobility model. submitted for publication, April 2004.Google ScholarGoogle Scholar
  9. W. Navidi and T. Camp. Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing, 3(1):99--108, January--March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Potter. Wireless security's future. IEEE Security and Privacy Magazine, 1(4):68{72, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Hu, A. Perrig, and D. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocom 2003, pages 1976{1986, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  12. P. Papadimittratos and Z. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulations Conference (CNDS 2002), San Antonio, 2002Google ScholarGoogle Scholar
  13. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113--127, 2003Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peerto-peer wireless network,". In Proceedings of the IEEE (Special Issue on Security and Cryptography), 2006.Google ScholarGoogle Scholar
  15. N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security. ACM, 2003, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ACWR '11: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
    December 2011
    517 pages
    ISBN:9781450310116
    DOI:10.1145/2185216

    Copyright © 2011 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 December 2011

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader