Skip to Main content Skip to Navigation
Journal articles

A secure and resistant architecture against attacks for mobile ad hoc networks

Abstract : In this paper, we propose a new architecture based on an efficient trust model and Secure Distributed Clustering Algorithm (SDCA) in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of a fully self-organized security for trust models like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust and mobility metrics, in order to select the clusterhead and to establish PKI in each cluster for authentication and exchange of data. Furthermore, we present a new approach: the Dynamic Demilitarized Zone (DDMZ) to protect the CA in each cluster. The principal idea of DDMZ consists in selecting the dispensable nodes, also called registration authorities (RA); these nodes must be confident and located at one-hope from the CA. Their roles are to receive, filter and treat the requests from any unknown node to the CA. With this approach, we can avoid the single point of failure in each cluster. Moreover, we propose a probabilistic model to define the direct connectivity between confident nodes in order to study the resistance degree of the DDMZ against different attacks. In addition, we evaluate the performance of the proposed SDCA and we estimate the robustness and the availability of DDMZ through the simulations. The effects of direct connectivity and transmission range on the stability and security of the network are analysed. The simulation's results confirm that the proposed architecture is scalable, secure and more resistant against attacks.
Document type :
Journal articles
Complete list of metadatas
Contributor : Abderrezak Rachedi <>
Submitted on : Monday, October 29, 2012 - 2:20:08 PM
Last modification on : Tuesday, January 14, 2020 - 10:38:15 AM

Links full text



Abderrezak Rachedi, Abderrahim Benslimane. A secure and resistant architecture against attacks for mobile ad hoc networks. Security and communication networks, John Wiley & Sons, Ltd, 2010, 3 (2-3), pp.150-166. ⟨10.1002/sec.116⟩. ⟨hal-00746613⟩



Record views