Loading...

Virtual address space mapping for IP auto-configuration in MANET with security capability

Taghiloo, M ; Sharif University of Technology | 2008

746 Viewed
  1. Type of Document: Article
  2. DOI: 10.1145/1509315.1509417
  3. Publisher: 2008
  4. Abstract:
  5. Mobile Ad Hoc Networks (MANETs) are networks with selforganizing capabilities and without a fixed infrastructure. Wireless nodes communicate among themselves using multi-hop radio relaying, without requiring the packets to pass through a central access point or a base station. In a highly mobile and infrastructure-less scenario, pre-configuration of addresses is not possible. Therefore node addresses need to be configured dynamically with minimum delay and packet loss. Existing solutions for IP address auto-configuration do not address security issues. In this paper we propose a secure address autoconfiguration for Mobile Ad hoc Networks (MANET) based on Virtual Address Space Mapping [1]. Without any proper authentication mechanism, a malicious node can affect the normal behavior of protocol. Therefore, this approach uses cryptography functions (one-way hash function and symmetric cryptography) to encountering of the all possible address auto-configuration attacks. The scheme uses virtual address space for addressing new nodes joining a network. The aim is to map one point from virtual address sheet to exactly one new node. The reason for using the term "virtual" is that the whole corresponding address space is a 2D flat sheet and each point of this sheet is virtually mapped to a node in MANET. The protocol uses coordinate values for generating addresses. Behavioral simulation had been used for analyzing of the protocol performance. Copyright © 2008 ACM
  6. Keywords:
  7. Access points ; Address autoconfiguration ; Address space ; Authentication mechanisms ; Auto-configuration ; Behavioral simulation ; Cryptography functions ; Flat sheets ; IP addresss ; Malicious nodes ; MANET ; MANET security ; Minimum delay ; Multihop ; Node address ; Normal behavior ; One way hash functions ; Protocol performance ; Security capability ; Security issues ; Self-organizing capability ; Symmetric cryptography ; Virtual address ; Virtual address space ; Wireless nodes ; Authentication ; Hash functions ; Internet protocols ; Mobile ad hoc networks ; Mobile telecommunication systems ; Security of data ; Ad hoc networks
  8. Source: Proceedings of the 2008 International Conference on Advanced Infocomm Technology, ICAIT '08, 29 July 2008 through 31 July 2008, Shenzhen ; 2008 ; 9781605580883 (ISBN)
  9. URL: https://dl.acm.org/doi/10.1145/1509315.1509417