A Security Framework for Buddy System based MANET Address Allocation Scheme
نویسندگان
چکیده
Security for dynamic address allocation service in Mobile Adhoc Networks is still an open issue. This paper proposes a security framework to thwart all possible attacks related to the buddy system based Distributed Dynamic Address Assignment Protocol (DDAAP) proposed by Thoppian and Prakash. Our proposed protocol called SHEAP (Secured tHrEshold based DDAAP) is based on a fully distributed PKI and a threshold based certified pool address allocation model. NS2 simulation results show that, while SHEAP is deployed, the increasing in communication overhead and latency is quite reasonable. The availability and the security are so guaranteed for the MANET auto-configuration service while still ensuring efficiently both network and security parameters for a newly arrived node.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملAn Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks
Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of r...
متن کاملDistributed Secure Intrusion - Detection System for Wireless Sensor Network
Invention of wireless network has brought up drastic change in networking. Mobile Ad hoc NETwork (MANET) has been evolved as one of the promising technology based on implementation of wireless network. Providing mobility, flexible infrastructure, fast and low cost deplyoment are the key features of MANET. MANET is being most widely used wireless technology has limited security against network a...
متن کاملارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...
متن کاملSelective Buddy Allocation for Scheduling Parallel Jobs on Clusters
In this paper, we evaluate the performance implications of using a buddy scheme for contiguous node allocation, in conjunction with a backfilling job scheduler for clusters. When a contiguous node allocation strategy is used, there is a trade-off between improved run-time of jobs (due to reduced link contention and lower communication overhead) and increased wait-time of jobs (due to external f...
متن کامل