A Secure Autoconfiguration Scheme for Merging Independent Adhoc Networks
نویسنده
چکیده
All the nodes in the adhoc network may move randomly and able to join or leave any network, nodes in adhoc networks are operating as routers and workstation. Nodes are capable to discover and maintain routes to every other node in the network and to propagate packets accordingly. Autoconfiguration of mobile nodes is an important issue on self configurable networks. Autoconfiguration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent adhoc networks merges to form a single network. Because when two independent mobile adhoc networks are merged then it may be possible that these independent networks have the nodes with a common IP address which results in IP address conflict. The problem arises when a malicious node request to participate in the ethos network and if this node is allowed to participate then the performance of the network is degraded because of the false information propagated to other nodes from this malicious node. So when a network is merged to another network then it is required to check whether the node is malicious or not. If the node(s) not malicious then only reconfiguration algorithm is applied. Most of the approaches available in the literature for secure autoconfiguration of IP addresses are based on single mobile adhoc network. In this paper we have proposed a new methodology for secure autoconfiguration of mobile nodes in the case of merging.
منابع مشابه
Merging independent mobile adhoc networks-A new methodology for autoconfiguration of IP addresses
Autoconfiguration of mobile nodes is an important issue on self-organizing mobile adhoc network. Autoconfiguration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent adhoc networks merges to form a single network. Because when two independent mobile adhoc networks are merg...
متن کاملAn address autoconfiguration protocol for IPv6 hosts in a mobile ad hoc network
A mobile ad hoc network is an infrastructure-free wireless network that is built on the fly. Since central administration or configuration by the users is impractical in such networks, autoconfiguration of network nodes is highly desirable. In this paper, we propose an approach to IPv6 address autoconfiguration in ad hoc networks, where we apply the IPv6 Stateless Address Autoconfiguration Prot...
متن کاملA Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks
Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management...
متن کاملPerformance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile ADHOC Networks
Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...
متن کاملSecure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model
Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the d...
متن کامل