An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments

Trust authority (TA) services are both important infrastructure services for layered protocols requiring the availability of an identification and authentication mechanism such as access control mechanisms and confidentiality services, and can also be viewed as exemplars for the secure and efficient distribution of computations in general. While such general problems have been studied extensively, tactical MANET environments impose a number of requirements and constraints such as RF range and cost, battery limitations, and computational capabilities which call for more specific approaches. In this paper we report the analysis of algorithms for TA service distribution based on cluster head algorithms and improvements on the basic algorithms based on the specific requirements as identified in the course of simulations of tactical scenarios and realizing appreciable increases in efficiency over the general case in the process.

[1]  Michael K. Reiter,et al.  Authentication metric analysis and design , 1999, TSEC.

[2]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[3]  Ravi Prakash,et al.  Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[4]  Mario Gerla,et al.  Efficient flooding with Passive Clustering (PC) in ad hoc networks , 2002, CCRV.

[5]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[6]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[7]  S. Reidt,et al.  Efficient Distribution of Trust Authority Functions in Tactical Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[8]  Anthony Ephremides,et al.  The Design and Simulation of a Mobile Radio Network with Distributed Control , 1984, IEEE J. Sel. Areas Commun..

[9]  Paul Stephen Gauthier,et al.  Reducing Power Consumption for the Next Generation of PDAs: It's in the Network Interface , 1996 .

[10]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Imrich Chlamtac,et al.  An Energy-Efficient Method for Nodes Assignment in Cluster-Based Ad Hoc Networks , 2004, Wirel. Networks.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Anthony Ephremides,et al.  The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..

[14]  Feipei Lai,et al.  SWARM: Secure Wireless Ad-hoc network Reliance Management , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[15]  Kemal Ertugrul Tepe,et al.  A high performance cluster-based broadcasting algorithm for wireless ad hoc networks based on a novel gateway selection approach , 2005, PE-WASUN '05.

[16]  Xiang-Yang Li,et al.  Distributed low-cost backbone formation for wireless ad hoc networks , 2005, MobiHoc '05.