Secure network configuration and route discovery for hybrid mobile ad hoc networks

Juhani Latvakoski, Teemu Väisänen, Tomi Hautakoski

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    This paper provides a novel security solution for hybrid mobile ad hoc networks. The solution relies on secure network configuration, which is based on the use of preconfigured self-certifying identifiers stored into a portable memory device by a trusted party, to be attached with ad hoc network nodes. Mutual authentication is carried between the friendly neighbour nodes based on the self-certifying identifiers, resulting a safe subnetwork inside the local ad hoc network. The route discovery is carried only in the safe subnetwork through trusted nodes, and therefore the route found always goes only via trusted nodes. The provided solution is realized as secure ad hoc routing protocol (SARP), which is evaluated in a laboratory environment using an ad hoc network consisting of 11 nodes with/without connection to static networks. The evaluations indicate sensible level of delays and performance even if security is taken on board. (12 refs.)
    Original languageEnglish
    Title of host publication2008 International Wireless Communications and Mobile Computing Conference
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages86 - 91
    ISBN (Electronic)978-1-4244-2202-9
    ISBN (Print)978-1-4244-2201-2
    DOIs
    Publication statusPublished - 2008
    MoE publication typeA4 Article in a conference publication
    EventInternational Wireless Communications and Mobile Computing Conference, IWCMC 2008 - Crete Island, Greece
    Duration: 6 Aug 20088 Aug 2008

    Conference

    ConferenceInternational Wireless Communications and Mobile Computing Conference, IWCMC 2008
    Country/TerritoryGreece
    CityCrete Island
    Period6/08/088/08/08

    Keywords

    • ad hoc networks
    • routing
    • security
    • self-signed identifier

    Fingerprint

    Dive into the research topics of 'Secure network configuration and route discovery for hybrid mobile ad hoc networks'. Together they form a unique fingerprint.

    Cite this