TY - JOUR
T1 - Resilient security mechanism for wireless Ad hoc network
AU - Vaidya, Binod
AU - Makrakis, Dimitrios
AU - Park, Jong Hyuk
AU - Yeo, Sang Soo
PY - 2011/2
Y1 - 2011/2
N2 - A wireless multihop network is emerging as one of the most important technologies in the field of ubiquitous networking. However, a number of formidable challenges remain, several of the most crucial been associated with robustness and network security. In this paper, we introduce a comprehensive resilient security framework for wireless ad hoc networks that are using multipath routing. It deploys an integrated multisignatures scheme and uses a self-certified public keying technique to ensure secure route discovery. In addition, it uses the Schnorr signature scheme along with an information dispersal algorithm to ensure secure data transfer. We provide security analysis of the proposed approach and compare it with several existing popular schemes. It can be seen that the proposed approach is more secure than other existing schemes. We also evaluated the proposed approach by means of computer simulation and compared its performance to that of the existing popular schemes. The results are in favor of the proposed technique in terms of efficiency and effectiveness.
AB - A wireless multihop network is emerging as one of the most important technologies in the field of ubiquitous networking. However, a number of formidable challenges remain, several of the most crucial been associated with robustness and network security. In this paper, we introduce a comprehensive resilient security framework for wireless ad hoc networks that are using multipath routing. It deploys an integrated multisignatures scheme and uses a self-certified public keying technique to ensure secure route discovery. In addition, it uses the Schnorr signature scheme along with an information dispersal algorithm to ensure secure data transfer. We provide security analysis of the proposed approach and compare it with several existing popular schemes. It can be seen that the proposed approach is more secure than other existing schemes. We also evaluated the proposed approach by means of computer simulation and compared its performance to that of the existing popular schemes. The results are in favor of the proposed technique in terms of efficiency and effectiveness.
KW - Ad hoc security
KW - Multipath routing
KW - Secure data transmission
KW - Wireless Ad hoc network
UR - https://www.scopus.com/pages/publications/79751533663
U2 - 10.1007/s11277-010-9978-7
DO - 10.1007/s11277-010-9978-7
M3 - Article
AN - SCOPUS:79751533663
SN - 0929-6212
VL - 56
SP - 385
EP - 401
JO - Wireless Personal Communications
JF - Wireless Personal Communications
IS - 3
ER -