Skip navigation

Securing autonomous networks through virtual closure

Securing autonomous networks through virtual closure

Hurley-Smith, Darren, Wetherall, Jodie ORCID: 0000-0002-4786-5824 and Adekunle, Andrew (2016) Securing autonomous networks through virtual closure. International Journal of Intelligent Computing Research (IJICR), 7 (2). pp. 695-705. ISSN 2042-4655 (doi:10.20533/ijicr.2042.4655.2016.0085)

[img]
Preview
PDF (Publisher's PDF - Open Access)
16178 WETHERALL_Securing_Autonomous_Networks_2016.pdf - Published Version

Download (1MB) | Preview

Abstract

The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures, raising the question of security as the application of such systems in potentially hostile environments. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs). VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).

Item Type: Article
Additional Information: The International Journal of Intelligent Computing Research (IJICR) is a peer-reviewed and open-access journal.
Uncontrolled Keywords: Mobile ad hoc networks; Access control; Authentication; Communication system security
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > Department of Engineering Science
Faculty of Engineering & Science > Future Technology and the Internet of Things
Last Modified: 15 Nov 2017 11:56
Selected for GREAT 2016: GREAT b
Selected for GREAT 2017: GREAT b
Selected for GREAT 2018: None
URI: http://gala.gre.ac.uk/id/eprint/16178

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics