z-logo
open-access-imgOpen Access
Overlay tunneling as a policy tool for defending mobile ad hoc networks
Author(s) -
Liu Xiruo,
Trappe Wade
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1640
Subject(s) - computer science , computer network , overlay network , mobile ad hoc network , routing protocol , vehicular ad hoc network , robustness (evolution) , computer security , wireless ad hoc network , distributed computing , overlay , network topology , the internet , routing (electronic design automation) , network packet , telecommunications , world wide web , biochemistry , chemistry , wireless , gene , programming language
Mobile ad hoc networks face many challenges when they are deployed, particularly problems associated with security and network failures arising from the dynamics of their network topologies. To address these issues, there have been many efforts to introduce security into the actual network protocols, most of which unfortunately struggle with the trade‐off between security and network overhead. Consequently, it is often desirable to have a lightweight approach to introduce security and robustness, where one employs conventional and well‐understood network protocols, and attempts to achieve the assurability of the network through higher‐layer, overlay mechanisms. This paper explores a lightweight overlay tunneling scheme operating at the Internet protocol layer as a policy tool that can mitigate network failures and attacks directed at the network without involving the redesign of the underlying routing protocols. Moreover, two optimizations are proposed that lead to improved performance when additional information is available. Copyright © 2016 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here