Loading…
Design and evaluation of a security architecture for ad hoc networks
Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deplo...
Saved in:
Published in: | International journal of pervasive computing and communications 2009-11, Vol.5 (4), p.448 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3 |
---|---|
cites | |
container_end_page | |
container_issue | 4 |
container_start_page | 448 |
container_title | International journal of pervasive computing and communications |
container_volume | 5 |
creator | Kraft, Daniel Bechler, Marc Hof, Hans-Joachim Pählke, Frank Wolf, Lars |
description | Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks. |
doi_str_mv | 10.1108/17427370911008848 |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1012283648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2657977011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</originalsourceid><addsrcrecordid>eNo9jU1LAzEURYMoWKs_wF3A9WhePmaSpbRahYIbBXflTebFTi0TTTKK_94RxdW95yzuZewcxCWAsFfQaNmoRriJhLXaHrDZj6saZZ8P_3sDx-wk550QtVVgZ2y5pNy_DByHjtMH7kcsfRx4DBx5Jj-mvnxxTH7bF_JlTMRDTBw7vo2eD1Q-Y3rNp-wo4D7T2V_O2dPtzePirlo_rO4X1-vKaylKpVxrgoVWaQJHCjWYWiBYaUwIhiYkJ71A5zGAVCbU6FonjfLBQUudmrOL3923FN9HymWzi2MapssNCJDSqlpb9Q19yUzX</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1012283648</pqid></control><display><type>article</type><title>Design and evaluation of a security architecture for ad hoc networks</title><source>Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list)</source><creator>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</creator><creatorcontrib>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</creatorcontrib><description>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/17427370911008848</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Access control ; Algorithms ; Architecture ; Certification ; Communication ; Confidentiality ; Cybersecurity ; Digital certificates ; Infrastructure ; Network security ; Private networks ; Security services ; Wireless communications</subject><ispartof>International journal of pervasive computing and communications, 2009-11, Vol.5 (4), p.448</ispartof><rights>Copyright Emerald Group Publishing Limited 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Kraft, Daniel</creatorcontrib><creatorcontrib>Bechler, Marc</creatorcontrib><creatorcontrib>Hof, Hans-Joachim</creatorcontrib><creatorcontrib>Pählke, Frank</creatorcontrib><creatorcontrib>Wolf, Lars</creatorcontrib><title>Design and evaluation of a security architecture for ad hoc networks</title><title>International journal of pervasive computing and communications</title><description>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Architecture</subject><subject>Certification</subject><subject>Communication</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Digital certificates</subject><subject>Infrastructure</subject><subject>Network security</subject><subject>Private networks</subject><subject>Security services</subject><subject>Wireless communications</subject><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNo9jU1LAzEURYMoWKs_wF3A9WhePmaSpbRahYIbBXflTebFTi0TTTKK_94RxdW95yzuZewcxCWAsFfQaNmoRriJhLXaHrDZj6saZZ8P_3sDx-wk550QtVVgZ2y5pNy_DByHjtMH7kcsfRx4DBx5Jj-mvnxxTH7bF_JlTMRDTBw7vo2eD1Q-Y3rNp-wo4D7T2V_O2dPtzePirlo_rO4X1-vKaylKpVxrgoVWaQJHCjWYWiBYaUwIhiYkJ71A5zGAVCbU6FonjfLBQUudmrOL3923FN9HymWzi2MapssNCJDSqlpb9Q19yUzX</recordid><startdate>20091120</startdate><enddate>20091120</enddate><creator>Kraft, Daniel</creator><creator>Bechler, Marc</creator><creator>Hof, Hans-Joachim</creator><creator>Pählke, Frank</creator><creator>Wolf, Lars</creator><general>Emerald Group Publishing Limited</general><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20091120</creationdate><title>Design and evaluation of a security architecture for ad hoc networks</title><author>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Architecture</topic><topic>Certification</topic><topic>Communication</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Digital certificates</topic><topic>Infrastructure</topic><topic>Network security</topic><topic>Private networks</topic><topic>Security services</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kraft, Daniel</creatorcontrib><creatorcontrib>Bechler, Marc</creatorcontrib><creatorcontrib>Hof, Hans-Joachim</creatorcontrib><creatorcontrib>Pählke, Frank</creatorcontrib><creatorcontrib>Wolf, Lars</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of pervasive computing and communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kraft, Daniel</au><au>Bechler, Marc</au><au>Hof, Hans-Joachim</au><au>Pählke, Frank</au><au>Wolf, Lars</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design and evaluation of a security architecture for ad hoc networks</atitle><jtitle>International journal of pervasive computing and communications</jtitle><date>2009-11-20</date><risdate>2009</risdate><volume>5</volume><issue>4</issue><spage>448</spage><pages>448-</pages><issn>1742-7371</issn><eissn>1742-738X</eissn><abstract>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/17427370911008848</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1742-7371 |
ispartof | International journal of pervasive computing and communications, 2009-11, Vol.5 (4), p.448 |
issn | 1742-7371 1742-738X |
language | eng |
recordid | cdi_proquest_journals_1012283648 |
source | Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list) |
subjects | Access control Algorithms Architecture Certification Communication Confidentiality Cybersecurity Digital certificates Infrastructure Network security Private networks Security services Wireless communications |
title | Design and evaluation of a security architecture for ad hoc networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T16%3A19%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20and%20evaluation%20of%20a%20security%20architecture%20for%20ad%20hoc%20networks&rft.jtitle=International%20journal%20of%20pervasive%20computing%20and%20communications&rft.au=Kraft,%20Daniel&rft.date=2009-11-20&rft.volume=5&rft.issue=4&rft.spage=448&rft.pages=448-&rft.issn=1742-7371&rft.eissn=1742-738X&rft_id=info:doi/10.1108/17427370911008848&rft_dat=%3Cproquest%3E2657977011%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1012283648&rft_id=info:pmid/&rfr_iscdi=true |