EVALUASI KINERJA CLUSTER-BASED KEY MANAGEMENT PADA MANET UNTUK KOMUNIKASI TAKTIS KAPAL PERANG

Dinar HS Wahyuni, Gamantyo Hendrantoro

Abstract


The role of communication networsk in millitary operation continues to grow in importance, with mission areas such as covert special operations, time critical, targeting, command and control all relying heavily on networks and network application. Mobile Ad Hoc Network (MANET), which is self-organizing, infrastructureless, multihop networks, is especially suitable for communication in millitary. The wireless and distributed nature of MANET and very bad security environment in battlefield bring a great challenge to securing tactical MANET. MANET is requires less or no fixed infrastructure support communication among nodes that can be quickly and adaptively constructed. Indeed, a fully realized MANET would be powerful in enabling highly mobile, highly responsive, and quickly deployable tactical forces. Security is one of the major issues in MANET. Due to the inherent nature of MANET, a security key management procces is always required. Key management plays an important role in the security of today’s information especially in MANET in which key management has received more and more attention for the dificulty to be implemented in such dynamic network. Desirable features of MANET for key management becomes our evaluation parameters. In this paper we compare the evaluation parameters among the existing methods using NS2 (Network Simulator 2).  


Full Text:

PDF

References


E. C. H. Ngai, M. R. Lyu, and R. T. Chin, “An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks,” in proc. IEEE Aerospace Conf., March, 6-13 2004.

Wieland, A., Wallenburg, C.M., 2012. Dealing with supply chain risks: Linking risk management practices and strategies to performance. International Journal of Physical Distribution & Logistics Management, 42(10) [2] C.-K. Toh, 2001, Ad Hoc Mobile Wireless Networks:Protocols and Systems. Prentice Hall PTR

J. Sharony, June 1996, “A Mobile Radio Network Architecture with Dynamically Changing Topo- logy using Virtual Subnets,” in proc. IEEE International Conf. o Communications (ICC/SUPERCOMM’96)

L. Zhou and Z. J. Haas, 1999, “Securing Ad Hoc Networks,” IEEE Network: special issue on network security, vol. 13, no. 6, pp. 24–30

S. Capkun, L. Buttyan, and J.-P. Hubaux, 2003, “Self- Organized Public-Key Management for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52–64

S. Yi and R. Kravets, 2004, “Composite Key Management for Ad Hoc Networks,” in proc. First Annual International Conf. on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August, 22 - 26

F. Richard Y., H. Tang, F. Wang,”A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks,” IEEE Transaction On Network And Service Management, Vol. 7, NO. 4, December 2010


Refbacks

  • There are currently no refbacks.