ABSTRACT
Key exchange in MANETs has been a challenging issue in current situations, because of rapid increasing of mobile devices. In such environment secure information sharing is very essential for users. This work has been trying to evaluate the performance of key exchange scheme using integrity regions in two mobility models. The simulation results show the performance of key exchange scheme using Integrity region. This paper is thus trying to find the better real time scenario for key exchange using paramount integrity region radius.
- IEEE Std 802.11i/d3.0. Available at http://www.cs.umd.edu/mhshin/doc/802.11/802.11i-D3.0.pdf. {10} Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In 8th ACM International Conference on Mobile Computing and Networking, pages 12{23, September 2002. Google ScholarDigital Library
- S. _Capkun and M. _Cagalj, "Integrity Regions: Authentication through Presence in Wireless Networks," IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 11, NOVEMBER 2010 Google ScholarDigital Library
- F. Bai, N. Sadagopan, and A. Helmy, Important: a framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks, in A Survey of MobIlity Models 29 Proceedings of IEEE Information Communications Conference (INFOCOM 2003), San Francisco, Apr. 2003.Google Scholar
- Random Waypoint Mobility Model in Cellular Networks Esa Hyytiä_ and Jorma VirtamoPublished in: Journal Wireless Networks, Volume 13 Issue2, April 2007 Google ScholarDigital Library
- David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, volume 353, pages 153--181. Kluwer Academic Publishers, 1996. Chapter 5.Google Scholar
- {BRS03} Christian Bettstetter, Giovanni Resta, and Paolo Santi. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing, 2(3):257--269, July--September 2003. Google ScholarDigital Library
- C. Bettstetter and C. Wagner. The spatial node distribution of the random waypoint mobility model. In Proceedings of German Workshop on Mobile Ad Hoc networks (WMAN), Ulm, Germany, March 2002. Google ScholarDigital Library
- Esa Hyytiä, Pasi Lassila, Laura Nieminen, and Jorma Virtamo. Spatial node distribution in the random waypoint mobility model. submitted for publication, April 2004.Google Scholar
- W. Navidi and T. Camp. Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing, 3(1):99--108, January--March 2004. Google ScholarDigital Library
- B. Potter. Wireless security's future. IEEE Security and Privacy Magazine, 1(4):68{72, 2003. Google ScholarDigital Library
- Y. Hu, A. Perrig, and D. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocom 2003, pages 1976{1986, 2003.Google ScholarCross Ref
- P. Papadimittratos and Z. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulations Conference (CNDS 2002), San Antonio, 2002Google Scholar
- C. Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113--127, 2003Google ScholarCross Ref
- M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peerto-peer wireless network,". In Proceedings of the IEEE (Special Issue on Security and Cryptography), 2006.Google Scholar
- N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security. ACM, 2003, pp. 1--10. Google ScholarDigital Library
Recommendations
Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs
ICPADS '07: Proceedings of the 13th International Conference on Parallel and Distributed Systems - Volume 02In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm ...
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009: Proceedings of the 7th International Conference on Wired/Wireless Internet CommunicationsMobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely ...
Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks
Q2SWinet '15: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile NetworksMassive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a ...
Comments