An Integrated Security Framework for Access Control and Address Auto-Configuration for MANETs

As mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in MANET security focused on secure routing and key management. In this paper, we propose an access control mechanism with features that is inherited to produce a secure address auto-configuration scheme providing a framework that guarantee access control and secure address auto-configuration for MANET nodes utilizing the concepts of identity-based cryptography and threshold secret sharing. Our mechanism provides key management service without any assumption of a prefixed trust relationship between nodes, which effectively resolves the problem of single point of failure in the traditional public key infrastructure. Simulations showed that the proposed architecture enhance QoS level compared to the existing approaches that aims to provide only access control or address auto-configuration separately. With a similar or a lower cost, our integrated approach enhanced MANET security and performance.

[1]  Gene Tsudik,et al.  Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[2]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[3]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Chris J. Mitchell,et al.  Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling , 2005, MSN.

[6]  Ana R. Cavalli,et al.  Secure hosts auto-configuration in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[7]  Ricardo Staciarini Puttini,et al.  A Secure Autoconfiguration Protocol for MANET Nodes , 2004, ADHOC-NOW.

[8]  Raja Datta,et al.  A secure dynamic IP configuration scheme for mobile ad hoc networks , 2011, Ad Hoc Networks.

[9]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[10]  Archan Misra,et al.  Autoconfiguration, registration, and mobility management for pervasive computing , 2001, IEEE Wirel. Commun..

[11]  Nitin H. Vaidya,et al.  Weak duplicate address detection in mobile ad hoc networks , 2002, MobiHoc '02.

[12]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[13]  Lionel M. Ni,et al.  Prophet address allocation for large scale MANETs , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[15]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[16]  Ravi Prakash,et al.  IP address assignment in a mobile ad hoc network , 2002, MILCOM 2002. Proceedings.

[17]  Ravi Prakash,et al.  MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[18]  Mohammed Feham,et al.  On Recent Security Enhancements to Autoconfiguration Protocols for MANETs Real Threats and Requirements , 2009 .

[19]  Raja Datta,et al.  ADIP: an improved authenticated dynamic IP configuration scheme for mobile ad hoc networks , 2009, Int. J. Ultra Wideband Commun. Syst..

[20]  Jeong Hyun Yi,et al.  Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.

[21]  Carlos J. Bernardos,et al.  Survey of IP address autoconfiguration mechanisms for MANETs , 2010 .

[22]  André Langer Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol , 2006 .

[23]  Jeong Hyun Yi,et al.  Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.

[24]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[25]  Jeong Hyun Yi,et al.  Access control in ad hoc groups , 2004 .

[26]  Peng Ning,et al.  Secure address auto-configuration for mobile ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[27]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[28]  Ali Movaghar-Rahimabadi,et al.  ID-NAC: Identity-based network access control for MANETs , 2008, 2008 16th IEEE International Conference on Networks.

[29]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.