Cluster-based secure communication mechanism in wireless ad hoc networks

In a multi-agent system, there are many intelligent agents distributed in the network. To connect with these agents easily and arbitrarily, wireless ad hoc network is a candidate. Wireless ad hoc network is a distinct network environment with characteristics in self-organisation, dynamical network topologies and easy construction. To provide such networks with secure communication, many researchers tried different ways to create the session key(s). However, there are some drawbacks in session key generation procedure, and the robust session key could not be created. The authors propose a cluster-based secure communication mechanism in wireless ad hoc networks. The proposal applies the Diffie–Hellman key exchange protocol for the session key creation. It helps the clusterhead to reduce the communication overload, to avoid the time synchronisation problem in nodes authentication and to preserve the complete secrecy requirements.

[1]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[2]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[3]  K. Duraiswamy,et al.  Key Management and Distribution for Authenticating Group Communication , 2006, First International Conference on Industrial and Information Systems.

[4]  Dharma P. Agrawal,et al.  Introduction to Wireless and Mobile Systems , 2002 .

[5]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[6]  Hua-Yi Lin,et al.  Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme , 2006, Journal of Computer Science and Technology.

[7]  M. Bansal,et al.  Mobile Ad hoc Networking ( MANET ) : Routing Protocol Performance Issues and Evaluation Considerations , 2010 .

[8]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[9]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[10]  Chin-Chen Chang,et al.  DH-based communication method for cluster-based ad hoc networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[13]  Yung-Fa Huang,et al.  Hierarchy-based key management for secure group communications in mobile ad hoc networks , 2007, IWCMC.

[14]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .