HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes

نویسندگان

  • Attila Altay Yavuz
  • Fatih Alagöz
  • Emin Anarim
چکیده

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we propose a new HIerarchical MUlti-Tier adaptive ad-hoc network security protocol based on SIgncryption type key exchange Schemes: HIMUTSIS. Our protocol makes contribution to the military MANETs in three major points: Architectural design, cryptographic methods used in military MANETs and key management techniques. Novel architectural design of HIMUTSIS facilitates certification and key management procedures, provides flexibility and reduces cryptographic workload of the military MANETs. In HIMUTSIS, as a novelty, we offer to use DKEUTS (Direct Key Exchange Using TimeStamp) protocol providing security and performance advantages when compared to some traditional cryptographic methods. Also, multi-security level approach provides adaptive solutions for each layer of the HIMUTSIS. As a key management technique, HIMUTSIS uses hybrid key management approach which reduces rekeying workload of the networks significantly while minimizing single point of failure risk of the military MANET.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption∗

Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptograp...

متن کامل

EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts

Wireless ad hoc networks are self-configurable and autonomous networks and this type of networks serve as a good candidate to provide communications of many novel applications, including mission critical applications, mobile and pervasive computing, etc. Such networks are often composed of computation-constrained or resource-limited devices and without any underlying infrastructure. On the othe...

متن کامل

ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks

Mobile ad-hoc networks consist of mobile nodes interconnected by multihop path that has no fixed network infrastructure support. Due to the limited bandwidth and resource, and also the frequent changes in topologies, ad-hoc network should consider these features for the provision of security. We present a secure routing protocol based on identity-based signcryption scheme. Since the proposed pr...

متن کامل

Addressing Security Concerns of Data Exchange in AODV Protocol

The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure...

متن کامل

A Multi-message and Multi-receiver Hybrid Signcryption Scheme for CATV Network

Recently, many multi-receiver signcryption schemes have been proposed. However, few schemes can send multimessages to multi-receivers, which is an important requirement for the cable television (CATV) networks. In this paper, to cope with the above problem, we present a multi-message and multi-receiver hybrid signcryption scheme based on the assumptions of a discrete logarithm and Gap Diffie He...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006