The adaptation of security mechanisms for Ad hoc Networks

Mobile Ad Hoc networks (MANETs) gain day after day places in our life considering the benefits given by these networks as mobility, facility of deployment and their costless. However their benefits are also subject of new challenges regarding the characteristics of these networks as battery and bandwidth constraints...etc. Therefore, new MANETs must confront lot of problems as security, routing, quality of service and energy saving. However from our point of view we see that the problem of security is the most important problem since mobile nodes are often part of hostile environment exposing them to new risks and attacks making private life or confidential information (commercial or military) in danger. Regarding the characteristics of mobile nodes as battery and processor power, existed and effective solutions developed for conventional networks are inapplicable directly for MANETs. Therefore in this thesis we try to give an adaptation of one of the most effective and efficient tool providing security for conventional networks which is Public Key Infrastructure (PKI), since it still questionable if it can be implemented for MANETs or not. Our proposed solution to adapt PKI for MANETs uses clustering, since recent researches have proven that clustering is effective to manage the complexity and the increasing size of MANETs, by dividing the whole network on a set of clusters (groups) in which one of the members plays the role of cluster-head managing its cluster and inter cluster communication. In our solution the cluster-head is the Certificate Authority of its cluster, guarantying in this way a permanent connection between the Certificate authority and the users. We’ve also developed and tested a new clustering algorithm called Secured Clustering Algorithm in order to support the security needs of clustered PKI, by including a set of security parameters in the creation of clusters.

[1]  Olivier Flauzac,et al.  Self-Stabilizing Clustering Algorithm for Ad Hoc Networks , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.

[2]  Alessandro Panconesi,et al.  Localized protocols for ad hoc clustering and backbone formation: a performance comparison , 2006, IEEE Transactions on Parallel and Distributed Systems.

[3]  Peng Wei,et al.  A Cluster-Based Multipath Routing for MANET , 2004 .

[4]  Lenka Carr-Motyckova,et al.  On clustering in ad hoc networks , 2003 .

[5]  Tsung-Chuan Huang,et al.  A double-manager k-hop clustering algorithm in mobile ad hoc networks , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[6]  Anthony Ephremides,et al.  The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..

[7]  Yueh-Min Huang,et al.  A limited flooding scheme for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[8]  Mario Gerla,et al.  EFFICIENT FLOODING IN AD HOC NETWORKS USING ON-DEMAND (PASSIVE) CLUSTER FORMATION , 2003 .

[9]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[10]  Sajal K. Das,et al.  WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.

[11]  Winston Khoon Guan Seah,et al.  Mobility-based d-hop clustering algorithm for mobile ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[12]  Béatrice Paillassa,et al.  A Cluster Procedure for the Dynamic Source Routing Protocol in Ad hoc Networks , 2004 .

[13]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.