{"title":"Dynamic mission critical network for mobile system","authors":"Z. Ahmed, R. Mehboob, S. A. Khan, H. Jamal","doi":"10.1109/ICM.2004.1434781","DOIUrl":null,"url":null,"abstract":"This paper proposes a hierarchical secure mobile ad hoc network architecture with mobile backbone nodes. The two challenges addressed here are the optimum connectivity and the provision of central command and control to secure mobile ad hoc network for a survivable system in the presence of malicious nodes. A GPS aware secure mobile ad hoc network architecture is presented, where mobile backbone nodes form the clusters' center and act as an authentication authority for all the cluster nodes. The mobile backbone nodes authenticate their cluster nodes by public key infrastructure and dynamically update their positions with topological changes caused by nodes' motion, nodes' failure and nodes' insertion. The motion of cluster center provides optimal connectivity with respect to line of sight, power and SNR. The scenarios that motivate this research include military applications requiring systematic and coordinated movement of troops in battlefields.","PeriodicalId":359193,"journal":{"name":"Proceedings. The 16th International Conference on Microelectronics, 2004. ICM 2004.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. The 16th International Conference on Microelectronics, 2004. ICM 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICM.2004.1434781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper proposes a hierarchical secure mobile ad hoc network architecture with mobile backbone nodes. The two challenges addressed here are the optimum connectivity and the provision of central command and control to secure mobile ad hoc network for a survivable system in the presence of malicious nodes. A GPS aware secure mobile ad hoc network architecture is presented, where mobile backbone nodes form the clusters' center and act as an authentication authority for all the cluster nodes. The mobile backbone nodes authenticate their cluster nodes by public key infrastructure and dynamically update their positions with topological changes caused by nodes' motion, nodes' failure and nodes' insertion. The motion of cluster center provides optimal connectivity with respect to line of sight, power and SNR. The scenarios that motivate this research include military applications requiring systematic and coordinated movement of troops in battlefields.