𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Secure hosts auto-configuration in mobile ad hoc networks

✍ Scribed by Ana Cavalli; Jean-Marie Orset


Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
414 KB
Volume
3
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.

✦ Synopsis


All existing routing protocols of Mobile Ad Hoc networks (MANET) assume that IP addresses of hosts are already configured before they join the network. In traditional schemes, this task is delegated to the dynamic host configuration protocol (DHCP [R. Droms, Dynamic host configuration protocol, RFC 2131, March 1997]), which allots an IP address to each requesting node. However, this process can not be applied in the context of MANET because of the lack of infrastructure and the great mobility that characterize them. A manual management of the addresses can be considered as long as the number of nodes remains reasonable. On the other hand, it is not possible any more since the network reaches a certain size. Some works proposed solutions to allow an automatic configuration of the nodes, i.e. without human intervention. Unfortunately these processes, often inspired of the traditional wired networks, are not always well adapted to MANET and appear relatively greedy concerning for example the delay, the address space or the bandwidth. Moreover, they apply only to ideal networks in which all nodes can trust each other. In this manner, they do absolutely not consider the security aspects and are thus not adapted to a real use in potentially hostile environment. In this paper, we propose a node auto-configuration scheme which uses the buddy system technique to allocate the addresses, as well as an algorithm allowing to authenticate the participants inside the network.


πŸ“œ SIMILAR VOLUMES


A secure dynamic IP configuration scheme
✍ Uttam Ghosh; Raja Datta πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 757 KB

Secure dynamic IP addressing is a prime requirement for unicast communication between authorized hosts in mobile ad hoc networks (MANETs). Recently, several approaches have been proposed for dynamic addressing scheme. However, most of the approaches rely on broadcasting for address solicitation and/

A secure multipath routing protocol in m
✍ Hao Yin; Yang Wang; Geyong Min; Sebastien Berton; Rui Guo; Chuang Lin πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 316 KB πŸ‘ 2 views

## Abstract Multipath routing can adapt to traffic changes, increase reliability and enhance the Quality of Service support in communication networks. This routing algorithm has been recognized as one of the salient features in Mobile __Ad hoc__ Networks (MANETs). However, existing multipath routin

Secure position-based routing protocol f
✍ Joo-Han Song; Vincent W.S. Wong; Victor C.M. Leung πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier Science 🌐 English βš– 297 KB

In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of posi

Hierarchical Cellular-Based management f
✍ Chih-Yung Chang; Chao-Tsun Chang πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 310 KB

This study proposes a hierarchical Cellular-Based management model for Mobile Ad-Hoc Networks. The proposed management model allows the mobile host to establish a stable communication path with fewer Β―ooding messages and smaller hop count. In the single-level management, a host is selected to act as