Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks

P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hu, Guangming, Huang, Zunguo, Hu, Hua-Ping, Gong, Zhenghu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 405
container_issue
container_start_page 398
container_title
container_volume
creator Hu, Guangming
Huang, Zunguo
Hu, Hua-Ping
Gong, Zhenghu
description P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.
doi_str_mv 10.1007/978-3-540-30207-0_50
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_16368308</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>16368308</sourcerecordid><originalsourceid>FETCH-LOGICAL-p228t-49b758c6fe84ff2f88b0575e045dd17400319549ecce1f990ccdd1e9909b62663</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRc1Loir9AxbesDSMX7G9LAhopUIrAWsrcZzKNCRRnArx9zgtYjYzc-dqdHUQuqZwSwHUnVGacCIFEA4MFAEr4QTNksyTeNDgFE1oRinhXJiz_xvjUml6jiajixgl-CWaxfgJqWgmlWQTtL7fh7oMzRbn-M27fe_xsqn6PA793g3jWrU93rANnnddHVw-hLaJODT4pS1C7fG8xIvW4Vc_fLf9Ll6hiyqvo5_99Sn6eHp8f1iQ1fp5-TBfkY4xPRBhCiW1yyqvRVWxSusCUiAPQpYlVQKAUyOF8c55WhkDziXdp8EUGcsyPkU3x79dHl1ep8SNC9F2ffjK-x9LM55pDjr52NEX06nZ-t4WbbuLloId6dqEynKbYNkDSTvS5b8R22ZY</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><source>Springer Books</source><creator>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu</creator><contributor>Jin, Hai ; Sun, Jianhua ; Xiao, Nong ; Pan, Yi</contributor><creatorcontrib>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu ; Jin, Hai ; Sun, Jianhua ; Xiao, Nong ; Pan, Yi</creatorcontrib><description>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540235781</identifier><identifier>ISBN: 3540235787</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540302070</identifier><identifier>EISBN: 3540302077</identifier><identifier>DOI: 10.1007/978-3-540-30207-0_50</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Malicious Node ; Multicast Tree ; Service Discovery ; Service Registration ; Software ; Transmission Range</subject><ispartof>Grid and Cooperative Computing - GCC 2004 Workshops, 2004, p.398-405</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-30207-0_50$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-30207-0_50$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16368308$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jin, Hai</contributor><contributor>Sun, Jianhua</contributor><contributor>Xiao, Nong</contributor><contributor>Pan, Yi</contributor><creatorcontrib>Hu, Guangming</creatorcontrib><creatorcontrib>Huang, Zunguo</creatorcontrib><creatorcontrib>Hu, Hua-Ping</creatorcontrib><creatorcontrib>Gong, Zhenghu</creatorcontrib><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><title>Grid and Cooperative Computing - GCC 2004 Workshops</title><description>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Malicious Node</subject><subject>Multicast Tree</subject><subject>Service Discovery</subject><subject>Service Registration</subject><subject>Software</subject><subject>Transmission Range</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540235781</isbn><isbn>3540235787</isbn><isbn>9783540302070</isbn><isbn>3540302077</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo9kMtOwzAQRc1Loir9AxbesDSMX7G9LAhopUIrAWsrcZzKNCRRnArx9zgtYjYzc-dqdHUQuqZwSwHUnVGacCIFEA4MFAEr4QTNksyTeNDgFE1oRinhXJiz_xvjUml6jiajixgl-CWaxfgJqWgmlWQTtL7fh7oMzRbn-M27fe_xsqn6PA793g3jWrU93rANnnddHVw-hLaJODT4pS1C7fG8xIvW4Vc_fLf9Ll6hiyqvo5_99Sn6eHp8f1iQ1fp5-TBfkY4xPRBhCiW1yyqvRVWxSusCUiAPQpYlVQKAUyOF8c55WhkDziXdp8EUGcsyPkU3x79dHl1ep8SNC9F2ffjK-x9LM55pDjr52NEX06nZ-t4WbbuLloId6dqEynKbYNkDSTvS5b8R22ZY</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Hu, Guangming</creator><creator>Huang, Zunguo</creator><creator>Hu, Hua-Ping</creator><creator>Gong, Zhenghu</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><author>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p228t-49b758c6fe84ff2f88b0575e045dd17400319549ecce1f990ccdd1e9909b62663</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Malicious Node</topic><topic>Multicast Tree</topic><topic>Service Discovery</topic><topic>Service Registration</topic><topic>Software</topic><topic>Transmission Range</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Guangming</creatorcontrib><creatorcontrib>Huang, Zunguo</creatorcontrib><creatorcontrib>Hu, Hua-Ping</creatorcontrib><creatorcontrib>Gong, Zhenghu</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Guangming</au><au>Huang, Zunguo</au><au>Hu, Hua-Ping</au><au>Gong, Zhenghu</au><au>Jin, Hai</au><au>Sun, Jianhua</au><au>Xiao, Nong</au><au>Pan, Yi</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</atitle><btitle>Grid and Cooperative Computing - GCC 2004 Workshops</btitle><date>2004</date><risdate>2004</risdate><spage>398</spage><epage>405</epage><pages>398-405</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540235781</isbn><isbn>3540235787</isbn><eisbn>9783540302070</eisbn><eisbn>3540302077</eisbn><abstract>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/978-3-540-30207-0_50</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Grid and Cooperative Computing - GCC 2004 Workshops, 2004, p.398-405
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_16368308
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Malicious Node
Multicast Tree
Service Discovery
Service Registration
Software
Transmission Range
title Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T17%3A28%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Building%20a%20Secure%20Infrastructure%20for%20P2P%20Applications%20in%20Mobile%20Ad%20Hoc%20Networks&rft.btitle=Grid%20and%20Cooperative%20Computing%20-%20GCC%202004%20Workshops&rft.au=Hu,%20Guangming&rft.date=2004&rft.spage=398&rft.epage=405&rft.pages=398-405&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540235781&rft.isbn_list=3540235787&rft_id=info:doi/10.1007/978-3-540-30207-0_50&rft_dat=%3Cpascalfrancis_sprin%3E16368308%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540302070&rft.eisbn_list=3540302077&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true