Skip to main navigation Skip to search Skip to main content

Modeling secure connectivity of self-organized wireless ad hoc networks

Chi Zhang, Yang Song, Yuguang Fang

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

Wireless ad hoc networks (WANETs) offer communications over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in self-organized WANETs is more challenging than in conventional networks due to the lack of central authorities. In this paper, we propose a generic model to evaluate the relationship of connectivity, memory size, communication overhead and security in fully self-organized WANETs. Based on some reasonable assumptions on node deployment and mobility, we show that when the average number of authenticated neighbors of each node is (-)(1), with respect to the network size n, most of the nodes can be securely connected, forming a connected secure backbone, i.e., the secure network percolates. This connected secure backbone can be utilized to break routing-security dependency loop, and provide enough derived secure links connecting isolated nodes with the secure backbone in a multi-hop fashion, which leads to the secure connectivity of the whole network. © 2008 IEEE.
Original languageEnglish
Title of host publicationINFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications
Pages825-833
DOIs
Publication statusPublished - 2008
Externally publishedYes
EventINFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications - Phoenix, AZ, United States
Duration: 13 Apr 200818 Apr 2008

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Conference

ConferenceINFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications
PlaceUnited States
CityPhoenix, AZ
Period13/04/0818/04/08

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'Modeling secure connectivity of self-organized wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this