Publicado:
2024-03-28Número:
Vol. 21 Núm. 1 (2024)Sección:
Investigación y DesarrolloSeguridad en Redes Ad Hoc: Implementación de Protocolos de Comunicación Usando Criptografía de Clave Pública
Ad Hoc Network Security: Implementing Communication Protocols Using Public Key Cryptography
Palabras clave:
Redes ad hoc, Criptografía de clave pública, Protocolos de comunicación, Seguridad de red (es).Palabras clave:
Ad hoc networks, Public key cryptography, Communication protocols, Network security (en).Descargas
Resumen (es)
Resumen
Las redes ad hoc, por su naturaleza descentralizada y dinámica, enfrentan significativos desafíos en términos de seguridad y comunicación. Estos desafíos son particularmente pronunciados debido a la falta de una infraestructura fija y la movilidad constante de los nodos. En este artículo, se explora la implementación de protocolos de comunicación seguros en redes ad hoc mediante el uso de criptografía de clave pública (PKC). Se proporciona una visión detallada de cómo la PKC puede ser utilizada para abordar los problemas de autenticación, confidencialidad e integridad en estas redes. Se analizan los fundamentos de la criptografía de clave pública y se presentan diversas técnicas para integrarla en protocolos de red ad hoc. Además, se incluyen simulaciones y estudios de caso para evaluar la efectividad de estos protocolos, destacando mejoras en la seguridad en comparación con métodos tradicionales. Este artículo ofrece una guía comprensiva para la implementación de soluciones de seguridad robustas en redes ad hoc, adaptadas a sus características específicas.
Resumen (en)
Ad hoc networks, due to their decentralized and dynamic nature, face significant challenges in terms of security and communication. These challenges are particularly pronounced due to the lack of a fixed infrastructure and the constant mobility of nodes. In this paper, we explore the implementation of secure communication protocols in ad hoc networks using public key cryptography (PKC). A detailed overview of how PKC can be used to address authentication, confidentiality and integrity issues in these networks is provided. The fundamentals of public key cryptography are discussed and various techniques for integrating it into ad hoc network protocols are presented. In addition, simulations and case studies are included to evaluate the effectiveness of these protocols, highlighting improvements in security compared to traditional methods. This article provides a comprehensive guide for the implementation of robust security solutions in ad hoc networks, adapted to their specific characteristics.
Referencias
A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, no. 11-12, pp. 2413-2427, 2007.
O. O. Obi, "Security issues in mobile ad-hoc networks: a survey," The 17th White House Papers Graduate Research In Informatics at Sussex, 2004.
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, 2006.
I. Vidal, C. García, I. Soto, and J. I. Moreno, "Servicios de valor añadido en redes móviles ad-hoc," Departamento de Ingeniería Telemática, Universidad Carlos III de Madrid, 2004.
P. P. López, D. D. J. C. H. Castro, and D. A. R. Garnacho, "Lightweight cryptography in radio frequency identification (RFID) systems," Computer Science Department, Carlos III University of Madrid, 2008.
L. Khelladi, D. Djenouri, and N. Badache, "Security issues of mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 4, pp. 2-28, 2005.
S. Zhao, A. Aggarwal, R. Frost, and X. Bai, "A survey of applications of identity-based cryptography in mobile ad-hoc networks," IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 380-400, 2011.
M. Zurbarán and P. Sanmartin, "Efectos de la comunicación en una red AD-HOC," Investigación e Innovación en Ingenierías, vol. 4, no. 1, 2016.
M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil, and I. H. Hasbullah, "Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey," IEEE Access, vol. 9, pp. 121522-121531, 2021.
N. Saxena, "Public key cryptography sans certificates in ad hoc networks," in Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, vol. 4, pp. 375-389, Springer Berlin Heidelberg.
L. Abusalah, A. Khokhar, and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 78-93, 2008.
M. Frodigh, P. Johansson, and P. Larsson, "Formation of wireless ad hoc networks: The art of forming networks without infrastructure," Ericsson Review, vol. 4, pp. 252, 2000.
V. Daza, J. Herranz, P. Morillo, and C. Rafols, "Cryptographic techniques for mobile ad-hoc networks," Computer Networks, vol. 51, no. 18, pp. 4938-4950, 2007.
J. P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Oct. 2001, pp. 146-155.
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: Challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, 2004.
G. Gaubatz, J. P. Kaps, and B. Sunar, "Public key cryptography in sensor networks—revisited," in Security in Ad-hoc and Sensor Networks: First European Workshop, ESAS 2004, Heidelberg, Germany, Aug. 6, 2004, vol. 1, pp. 2-18, Springer Berlin Heidelberg.
Cómo citar
IEEE
ACM
ACS
APA
ABNT
Chicago
Harvard
MLA
Turabian
Vancouver
Descargar cita
Visitas
Descargas
Licencia
Derechos de autor 2024 Revista Vínculos
Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial 4.0.
Este obra está bajo una licencia Creative Commons Atribución 4.0