{"title":"战场中移动和异构无线网络的安全性","authors":"A. Durresi, M. Durresi, L. Barolli","doi":"10.1109/ICPP-W.2008.36","DOIUrl":null,"url":null,"abstract":"Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such as solders, vehicles, and so on. The security of information in such highly dynamic environment is paramount. Therefore, we have developed a new security scheme based on key distribution among stationary sensor and ad hoc networks, and mobile nodes. Our scheme is based on key predistribution using a large key pool, which is segmented into smaller key pools. Each of these segments acts as the key pool for different stationary sensor networks. The mobile nodes get keys from the aggregate of all these segments. The aggregate key pool can have some segments which can be used for future deployments. We have performed extensive analysis and simulations to validate the proposed scheme.","PeriodicalId":231042,"journal":{"name":"2008 International Conference on Parallel Processing - Workshops","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security of Mobile and Heterogeneous Wireless Networks in Battlefields\",\"authors\":\"A. Durresi, M. Durresi, L. Barolli\",\"doi\":\"10.1109/ICPP-W.2008.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such as solders, vehicles, and so on. The security of information in such highly dynamic environment is paramount. Therefore, we have developed a new security scheme based on key distribution among stationary sensor and ad hoc networks, and mobile nodes. Our scheme is based on key predistribution using a large key pool, which is segmented into smaller key pools. Each of these segments acts as the key pool for different stationary sensor networks. The mobile nodes get keys from the aggregate of all these segments. The aggregate key pool can have some segments which can be used for future deployments. We have performed extensive analysis and simulations to validate the proposed scheme.\",\"PeriodicalId\":231042,\"journal\":{\"name\":\"2008 International Conference on Parallel Processing - Workshops\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Parallel Processing - Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPP-W.2008.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Parallel Processing - Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPP-W.2008.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of Mobile and Heterogeneous Wireless Networks in Battlefields
Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such as solders, vehicles, and so on. The security of information in such highly dynamic environment is paramount. Therefore, we have developed a new security scheme based on key distribution among stationary sensor and ad hoc networks, and mobile nodes. Our scheme is based on key predistribution using a large key pool, which is segmented into smaller key pools. Each of these segments acts as the key pool for different stationary sensor networks. The mobile nodes get keys from the aggregate of all these segments. The aggregate key pool can have some segments which can be used for future deployments. We have performed extensive analysis and simulations to validate the proposed scheme.