Skip navigation

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

Smith, Darren P., Wetherall, Jodie ORCID: 0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:https://doi.org/10.1109/ICITST.2015.7412128)

[img]
Preview
PDF (Author Accepted Manuscript)
14191_WETHERALL_Virtual_Closed_Networks_2015.pdf - Accepted Version

Download (336kB)

Abstract

The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures; raising the question of security as the application of such systems in potentially hostile environments becomes a desired function of such networks. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs), at a high cost in network resources during the setup of secure tunnels. VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs, which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication, a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).

Item Type: Conference Proceedings
Title of Proceedings: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
Additional Information: Date of conference: 14-16 Dec. 2015
Uncontrolled Keywords: virtual closed network, virtual private network, security, MANET, autonomy
Subjects: S Agriculture > S Agriculture (General)
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > Internet Security Research Laboratory
Last Modified: 21 Apr 2017 10:50
URI: http://gala.gre.ac.uk/id/eprint/14191

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics