IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Dynamic Security Scheme for MANET

Dynamic Security Scheme for MANET
View Free PDF
Author(s): A. Shajin Nargunam (N.I. College of Engineering, India)and M. P. Sebastian (Naitonal Institute of Technology, India)
Copyright: 2007
Pages: 4
Source title: Managing Worldwide Operations and Communications with Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-929-8.ch399
ISBN13: 9781599049298
EISBN13: 9781466665378

Abstract

Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed In MANET any node may compromise the packet routing functionality by disrupting the route discovery process.. These unique characteristics of mobile ad hoc networks causes a number of nontrivial challenges to security design such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.

Body Bottom