A Secure Autoconfiguration Scheme for Merging Independent Adhoc Networks

نویسنده

  • Mukesh Chand
چکیده

All the nodes in the adhoc network may move randomly and able to join or leave any network, nodes in adhoc networks are operating as routers and workstation. Nodes are capable to discover and maintain routes to every other node in the network and to propagate packets accordingly. Autoconfiguration of mobile nodes is an important issue on self configurable networks. Autoconfiguration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent adhoc networks merges to form a single network. Because when two independent mobile adhoc networks are merged then it may be possible that these independent networks have the nodes with a common IP address which results in IP address conflict. The problem arises when a malicious node request to participate in the ethos network and if this node is allowed to participate then the performance of the network is degraded because of the false information propagated to other nodes from this malicious node. So when a network is merged to another network then it is required to check whether the node is malicious or not. If the node(s) not malicious then only reconfiguration algorithm is applied. Most of the approaches available in the literature for secure autoconfiguration of IP addresses are based on single mobile adhoc network. In this paper we have proposed a new methodology for secure autoconfiguration of mobile nodes in the case of merging.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Merging independent mobile adhoc networks-A new methodology for autoconfiguration of IP addresses

Autoconfiguration of mobile nodes is an important issue on self-organizing mobile adhoc network. Autoconfiguration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent adhoc networks merges to form a single network. Because when two independent mobile adhoc networks are merg...

متن کامل

An address autoconfiguration protocol for IPv6 hosts in a mobile ad hoc network

A mobile ad hoc network is an infrastructure-free wireless network that is built on the fly. Since central administration or configuration by the users is impractical in such networks, autoconfiguration of network nodes is highly desirable. In this paper, we propose an approach to IPv6 address autoconfiguration in ad hoc networks, where we apply the IPv6 Stateless Address Autoconfiguration Prot...

متن کامل

A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management...

متن کامل

Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...

متن کامل

Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model

Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013