Loading…

Design and evaluation of a security architecture for ad hoc networks

Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deplo...

Full description

Saved in:
Bibliographic Details
Published in:International journal of pervasive computing and communications 2009-11, Vol.5 (4), p.448
Main Authors: Kraft, Daniel, Bechler, Marc, Hof, Hans-Joachim, Pählke, Frank, Wolf, Lars
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3
cites
container_end_page
container_issue 4
container_start_page 448
container_title International journal of pervasive computing and communications
container_volume 5
creator Kraft, Daniel
Bechler, Marc
Hof, Hans-Joachim
Pählke, Frank
Wolf, Lars
description Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.
doi_str_mv 10.1108/17427370911008848
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1012283648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2657977011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</originalsourceid><addsrcrecordid>eNo9jU1LAzEURYMoWKs_wF3A9WhePmaSpbRahYIbBXflTebFTi0TTTKK_94RxdW95yzuZewcxCWAsFfQaNmoRriJhLXaHrDZj6saZZ8P_3sDx-wk550QtVVgZ2y5pNy_DByHjtMH7kcsfRx4DBx5Jj-mvnxxTH7bF_JlTMRDTBw7vo2eD1Q-Y3rNp-wo4D7T2V_O2dPtzePirlo_rO4X1-vKaylKpVxrgoVWaQJHCjWYWiBYaUwIhiYkJ71A5zGAVCbU6FonjfLBQUudmrOL3923FN9HymWzi2MapssNCJDSqlpb9Q19yUzX</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1012283648</pqid></control><display><type>article</type><title>Design and evaluation of a security architecture for ad hoc networks</title><source>Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list)</source><creator>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</creator><creatorcontrib>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</creatorcontrib><description>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/17427370911008848</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Access control ; Algorithms ; Architecture ; Certification ; Communication ; Confidentiality ; Cybersecurity ; Digital certificates ; Infrastructure ; Network security ; Private networks ; Security services ; Wireless communications</subject><ispartof>International journal of pervasive computing and communications, 2009-11, Vol.5 (4), p.448</ispartof><rights>Copyright Emerald Group Publishing Limited 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Kraft, Daniel</creatorcontrib><creatorcontrib>Bechler, Marc</creatorcontrib><creatorcontrib>Hof, Hans-Joachim</creatorcontrib><creatorcontrib>Pählke, Frank</creatorcontrib><creatorcontrib>Wolf, Lars</creatorcontrib><title>Design and evaluation of a security architecture for ad hoc networks</title><title>International journal of pervasive computing and communications</title><description>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Architecture</subject><subject>Certification</subject><subject>Communication</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Digital certificates</subject><subject>Infrastructure</subject><subject>Network security</subject><subject>Private networks</subject><subject>Security services</subject><subject>Wireless communications</subject><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNo9jU1LAzEURYMoWKs_wF3A9WhePmaSpbRahYIbBXflTebFTi0TTTKK_94RxdW95yzuZewcxCWAsFfQaNmoRriJhLXaHrDZj6saZZ8P_3sDx-wk550QtVVgZ2y5pNy_DByHjtMH7kcsfRx4DBx5Jj-mvnxxTH7bF_JlTMRDTBw7vo2eD1Q-Y3rNp-wo4D7T2V_O2dPtzePirlo_rO4X1-vKaylKpVxrgoVWaQJHCjWYWiBYaUwIhiYkJ71A5zGAVCbU6FonjfLBQUudmrOL3923FN9HymWzi2MapssNCJDSqlpb9Q19yUzX</recordid><startdate>20091120</startdate><enddate>20091120</enddate><creator>Kraft, Daniel</creator><creator>Bechler, Marc</creator><creator>Hof, Hans-Joachim</creator><creator>Pählke, Frank</creator><creator>Wolf, Lars</creator><general>Emerald Group Publishing Limited</general><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20091120</creationdate><title>Design and evaluation of a security architecture for ad hoc networks</title><author>Kraft, Daniel ; Bechler, Marc ; Hof, Hans-Joachim ; Pählke, Frank ; Wolf, Lars</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Architecture</topic><topic>Certification</topic><topic>Communication</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Digital certificates</topic><topic>Infrastructure</topic><topic>Network security</topic><topic>Private networks</topic><topic>Security services</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kraft, Daniel</creatorcontrib><creatorcontrib>Bechler, Marc</creatorcontrib><creatorcontrib>Hof, Hans-Joachim</creatorcontrib><creatorcontrib>Pählke, Frank</creatorcontrib><creatorcontrib>Wolf, Lars</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of pervasive computing and communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kraft, Daniel</au><au>Bechler, Marc</au><au>Hof, Hans-Joachim</au><au>Pählke, Frank</au><au>Wolf, Lars</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design and evaluation of a security architecture for ad hoc networks</atitle><jtitle>International journal of pervasive computing and communications</jtitle><date>2009-11-20</date><risdate>2009</risdate><volume>5</volume><issue>4</issue><spage>448</spage><pages>448-</pages><issn>1742-7371</issn><eissn>1742-738X</eissn><abstract>Purpose - Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues. Design/methodology/approach - In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network-signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates. Findings - The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log-on times, availability, and communication overhead. Originality/value - The paper introduces a cluster-based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/17427370911008848</doi></addata></record>
fulltext fulltext
identifier ISSN: 1742-7371
ispartof International journal of pervasive computing and communications, 2009-11, Vol.5 (4), p.448
issn 1742-7371
1742-738X
language eng
recordid cdi_proquest_journals_1012283648
source Emerald:Jisc Collections:Emerald Subject Collections HE and FE 2024-2026:Emerald Premier (reading list)
subjects Access control
Algorithms
Architecture
Certification
Communication
Confidentiality
Cybersecurity
Digital certificates
Infrastructure
Network security
Private networks
Security services
Wireless communications
title Design and evaluation of a security architecture for ad hoc networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T16%3A19%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20and%20evaluation%20of%20a%20security%20architecture%20for%20ad%20hoc%20networks&rft.jtitle=International%20journal%20of%20pervasive%20computing%20and%20communications&rft.au=Kraft,%20Daniel&rft.date=2009-11-20&rft.volume=5&rft.issue=4&rft.spage=448&rft.pages=448-&rft.issn=1742-7371&rft.eissn=1742-738X&rft_id=info:doi/10.1108/17427370911008848&rft_dat=%3Cproquest%3E2657977011%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c420t-39b5f81b34e19e3a41560a18255ff5e415e92c0a9caf1235f6a9b9253cf91bed3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1012283648&rft_id=info:pmid/&rfr_iscdi=true