MILCOM 2005 - 2005 IEEE Military Communications Conference 2005
DOI: 10.1109/milcom.2005.1606111
|View full text |Cite
|
Sign up to set email alerts
|

Securing ad-hoc networks using IPsec

Abstract: The use of IPSec for securing communication between nodes of wireless and mobile ad hoc networks has traditionally been considered difficult. We describe an IPSec-based architecture and implementation for ad hoc networks that can seamlessly handle node mobility and IP address change. The approach can be used for securing application traffic as well as configuration and mobility management protocol traffic. A certificate-based approach that aids dynamic key generation and distribution is used for creating secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Ghosh et al discuss the modification of a certificatebased application of IPsec supporting dynamic key-generation for MANETs [24]. They state that their approach secures mobility, application and management traffic.…”
Section: Secure Communicationmentioning
confidence: 99%
“…Ghosh et al discuss the modification of a certificatebased application of IPsec supporting dynamic key-generation for MANETs [24]. They state that their approach secures mobility, application and management traffic.…”
Section: Secure Communicationmentioning
confidence: 99%
“…Furthermore, for disaster relief communication and tactical networks (see Figure 4) [4,5,6] they may also rely on mobile ad-hoc networks (MANETs), which are highly dynamic mesh networks created by soldiers or members of emergency services. Due to the nature of these networks, they must incorporate distributed auto-configuration mechanisms that need to be able to cope with high churn, bad radio conditions, and potentially compromised VPN devices.…”
Section: Governmental and Military Vpnsmentioning
confidence: 99%
“…This dynamic nature of a mobile smart phone needs to use smartphone's changed domain specific routing address, referred to as its TIP, to route packets to it. [1] has shown the mechanism that application layer packets need address translation before they can be routed to their destination. [1] argues that there is a need for an application layer entity to be able to identify a node by means other than its routable address.…”
Section: Obtaining Call-basis Temporally Ip Addressmentioning
confidence: 99%
“…The presence of wireless links makes mobile Ad hoc networks (MANETs) more vulnerable than wire-line networks to various forms of attack [1], [2]. Security requirements for session communications in MANETs can be fulfilled by applying the dynamic session key management architecture [3], [4], [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation