Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks
P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 405 |
---|---|
container_issue | |
container_start_page | 398 |
container_title | |
container_volume | |
creator | Hu, Guangming Huang, Zunguo Hu, Hua-Ping Gong, Zhenghu |
description | P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results. |
doi_str_mv | 10.1007/978-3-540-30207-0_50 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_16368308</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>16368308</sourcerecordid><originalsourceid>FETCH-LOGICAL-p228t-49b758c6fe84ff2f88b0575e045dd17400319549ecce1f990ccdd1e9909b62663</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRc1Loir9AxbesDSMX7G9LAhopUIrAWsrcZzKNCRRnArx9zgtYjYzc-dqdHUQuqZwSwHUnVGacCIFEA4MFAEr4QTNksyTeNDgFE1oRinhXJiz_xvjUml6jiajixgl-CWaxfgJqWgmlWQTtL7fh7oMzRbn-M27fe_xsqn6PA793g3jWrU93rANnnddHVw-hLaJODT4pS1C7fG8xIvW4Vc_fLf9Ll6hiyqvo5_99Sn6eHp8f1iQ1fp5-TBfkY4xPRBhCiW1yyqvRVWxSusCUiAPQpYlVQKAUyOF8c55WhkDziXdp8EUGcsyPkU3x79dHl1ep8SNC9F2ffjK-x9LM55pDjr52NEX06nZ-t4WbbuLloId6dqEynKbYNkDSTvS5b8R22ZY</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><source>Springer Books</source><creator>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu</creator><contributor>Jin, Hai ; Sun, Jianhua ; Xiao, Nong ; Pan, Yi</contributor><creatorcontrib>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu ; Jin, Hai ; Sun, Jianhua ; Xiao, Nong ; Pan, Yi</creatorcontrib><description>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540235781</identifier><identifier>ISBN: 3540235787</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540302070</identifier><identifier>EISBN: 3540302077</identifier><identifier>DOI: 10.1007/978-3-540-30207-0_50</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Malicious Node ; Multicast Tree ; Service Discovery ; Service Registration ; Software ; Transmission Range</subject><ispartof>Grid and Cooperative Computing - GCC 2004 Workshops, 2004, p.398-405</ispartof><rights>Springer-Verlag Berlin Heidelberg 2004</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-30207-0_50$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-30207-0_50$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16368308$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jin, Hai</contributor><contributor>Sun, Jianhua</contributor><contributor>Xiao, Nong</contributor><contributor>Pan, Yi</contributor><creatorcontrib>Hu, Guangming</creatorcontrib><creatorcontrib>Huang, Zunguo</creatorcontrib><creatorcontrib>Hu, Hua-Ping</creatorcontrib><creatorcontrib>Gong, Zhenghu</creatorcontrib><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><title>Grid and Cooperative Computing - GCC 2004 Workshops</title><description>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Malicious Node</subject><subject>Multicast Tree</subject><subject>Service Discovery</subject><subject>Service Registration</subject><subject>Software</subject><subject>Transmission Range</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540235781</isbn><isbn>3540235787</isbn><isbn>9783540302070</isbn><isbn>3540302077</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo9kMtOwzAQRc1Loir9AxbesDSMX7G9LAhopUIrAWsrcZzKNCRRnArx9zgtYjYzc-dqdHUQuqZwSwHUnVGacCIFEA4MFAEr4QTNksyTeNDgFE1oRinhXJiz_xvjUml6jiajixgl-CWaxfgJqWgmlWQTtL7fh7oMzRbn-M27fe_xsqn6PA793g3jWrU93rANnnddHVw-hLaJODT4pS1C7fG8xIvW4Vc_fLf9Ll6hiyqvo5_99Sn6eHp8f1iQ1fp5-TBfkY4xPRBhCiW1yyqvRVWxSusCUiAPQpYlVQKAUyOF8c55WhkDziXdp8EUGcsyPkU3x79dHl1ep8SNC9F2ffjK-x9LM55pDjr52NEX06nZ-t4WbbuLloId6dqEynKbYNkDSTvS5b8R22ZY</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Hu, Guangming</creator><creator>Huang, Zunguo</creator><creator>Hu, Hua-Ping</creator><creator>Gong, Zhenghu</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</title><author>Hu, Guangming ; Huang, Zunguo ; Hu, Hua-Ping ; Gong, Zhenghu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p228t-49b758c6fe84ff2f88b0575e045dd17400319549ecce1f990ccdd1e9909b62663</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Malicious Node</topic><topic>Multicast Tree</topic><topic>Service Discovery</topic><topic>Service Registration</topic><topic>Software</topic><topic>Transmission Range</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Guangming</creatorcontrib><creatorcontrib>Huang, Zunguo</creatorcontrib><creatorcontrib>Hu, Hua-Ping</creatorcontrib><creatorcontrib>Gong, Zhenghu</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Guangming</au><au>Huang, Zunguo</au><au>Hu, Hua-Ping</au><au>Gong, Zhenghu</au><au>Jin, Hai</au><au>Sun, Jianhua</au><au>Xiao, Nong</au><au>Pan, Yi</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks</atitle><btitle>Grid and Cooperative Computing - GCC 2004 Workshops</btitle><date>2004</date><risdate>2004</risdate><spage>398</spage><epage>405</epage><pages>398-405</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540235781</isbn><isbn>3540235787</isbn><eisbn>9783540302070</eisbn><eisbn>3540302077</eisbn><abstract>P2P and MANET share many similarities. Deploying P2P application in MANET faces many difficulties, especially when security consideration is incorporated. In this paper we propose a cluster-based architecture combined with a group key management scheme for mobile ad hoc network. A network is divided into clusters and each cluster has a leader called clusterhead. In order to address the problem of service registration and discovery better, we also propose a simple multicast-tree algorithm which organizes all clusterheads into trees based on each source clusterhead. The feasibility of this concept was verified by simulation results.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/978-3-540-30207-0_50</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Grid and Cooperative Computing - GCC 2004 Workshops, 2004, p.398-405 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_16368308 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Malicious Node Multicast Tree Service Discovery Service Registration Software Transmission Range |
title | Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T17%3A28%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Building%20a%20Secure%20Infrastructure%20for%20P2P%20Applications%20in%20Mobile%20Ad%20Hoc%20Networks&rft.btitle=Grid%20and%20Cooperative%20Computing%20-%20GCC%202004%20Workshops&rft.au=Hu,%20Guangming&rft.date=2004&rft.spage=398&rft.epage=405&rft.pages=398-405&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540235781&rft.isbn_list=3540235787&rft_id=info:doi/10.1007/978-3-540-30207-0_50&rft_dat=%3Cpascalfrancis_sprin%3E16368308%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540302070&rft.eisbn_list=3540302077&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |