{"title":"SWARM: Secure Wireless Ad-hoc network Reliance Management","authors":"Lin-Jiun Tsai, J. Lin, F. Lai","doi":"10.1109/ISWPC.2006.1613626","DOIUrl":null,"url":null,"abstract":"We use a clustering heuristic and adapt it for security requirements to provide a scalable authentication framework in the clustered ad hoc network. This novel approach can be used to achieve a variety of security objectives through the peer-to-peer authentication scheme. It scales well to large network size and does not require high node density and mobility speed like other distributed schemes. After forming clusters with a radius parameter, it allows separate authentication services to be employed for different physical conditions or security requirements into independent clusters, and each node in the network can obtain the topology of the clusters as well as the keys of all authentication services. The topology describes the trust relationship among clusters and is used to evaluate the trustworthiness of clusters. Finally, we evaluate the security scheme and simulate its performance on various configurations.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 1st International Symposium on Wireless Pervasive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWPC.2006.1613626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
We use a clustering heuristic and adapt it for security requirements to provide a scalable authentication framework in the clustered ad hoc network. This novel approach can be used to achieve a variety of security objectives through the peer-to-peer authentication scheme. It scales well to large network size and does not require high node density and mobility speed like other distributed schemes. After forming clusters with a radius parameter, it allows separate authentication services to be employed for different physical conditions or security requirements into independent clusters, and each node in the network can obtain the topology of the clusters as well as the keys of all authentication services. The topology describes the trust relationship among clusters and is used to evaluate the trustworthiness of clusters. Finally, we evaluate the security scheme and simulate its performance on various configurations.