An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments
نویسندگان
چکیده
Trust authority (TA) services are both important infrastructure services for layered protocols requiring the availability of an identification and authentication mechanism such as access control mechanisms and confidentiality services, and can also be viewed as exemplars for the secure and efficient distribution of computations in general. While such general problems have been studied extensively, tactical MANET environments impose a number of requirements and constraints such as RF range and cost, battery limitations, and computational capabilities which call for more specific approaches. In this paper we report the analysis of algorithms for TA service distribution based on cluster head algorithms and improvements on the basic algorithms based on the specific requirements as identified in the course of simulations of tactical scenarios and realizing appreciable increases in efficiency over the general case in the process.
منابع مشابه
Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملInitial Studies on Worm Propagation in Manets for Future Army Combat Systems
This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA Defense Against Cyber Attacks on MANETS (DARPA, 2004), ”One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and saturate MANET-based networks on the order of seconds”. Critical to the design of effective worm counter m...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملComparative Analysis of MANET Routing Protocols and Cluster Head Selection Technique in MANET
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence o...
متن کاملMITE – MANET Intrusion Detection for Tactical Environments
Mobile ad hoc networks (MANETs) provide possibilities to realize IP-based networks without the presence of a fixed infrastructure. Therefore, this technology has also become attractive for tactical networks, such as in command posts, vehicle convoys, autonomous robot systems, and also for infantry troops. Due to its radio characteristics, it is widely known that MANETs may become subject to dif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007