Securing Autonomous Networks through Virtual Closure. / Hurley-Smith, Darren; Wetherall, Jodie; Adekunle, Andrew.

In: International Journal of Intelligent Computing Research (IJICR), Vol. 7, No. 2, 06.2016, p. 694-705.

Research output: Contribution to journalArticle

Published

Standard

Securing Autonomous Networks through Virtual Closure. / Hurley-Smith, Darren; Wetherall, Jodie; Adekunle, Andrew.

In: International Journal of Intelligent Computing Research (IJICR), Vol. 7, No. 2, 06.2016, p. 694-705.

Research output: Contribution to journalArticle

Harvard

Hurley-Smith, D, Wetherall, J & Adekunle, A 2016, 'Securing Autonomous Networks through Virtual Closure', International Journal of Intelligent Computing Research (IJICR), vol. 7, no. 2, pp. 694-705.

APA

Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2016). Securing Autonomous Networks through Virtual Closure. International Journal of Intelligent Computing Research (IJICR), 7(2), 694-705.

Vancouver

Hurley-Smith D, Wetherall J, Adekunle A. Securing Autonomous Networks through Virtual Closure. International Journal of Intelligent Computing Research (IJICR). 2016 Jun;7(2):694-705.

Author

Hurley-Smith, Darren ; Wetherall, Jodie ; Adekunle, Andrew. / Securing Autonomous Networks through Virtual Closure. In: International Journal of Intelligent Computing Research (IJICR). 2016 ; Vol. 7, No. 2. pp. 694-705.

BibTeX

@article{6b24f6324be04ed586330ba4655c1a51,
title = "Securing Autonomous Networks through Virtual Closure",
abstract = "The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures, raising the question of security as the application of such systems in potentially hostile environments. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs). VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).",
author = "Darren Hurley-Smith and Jodie Wetherall and Andrew Adekunle",
year = "2016",
month = jun
language = "English",
volume = "7",
pages = "694--705",
journal = "International Journal of Intelligent Computing Research (IJICR)",
publisher = "Infonomics Society",
number = "2",

}

RIS

TY - JOUR

T1 - Securing Autonomous Networks through Virtual Closure

AU - Hurley-Smith, Darren

AU - Wetherall, Jodie

AU - Adekunle, Andrew

PY - 2016/6

Y1 - 2016/6

N2 - The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures, raising the question of security as the application of such systems in potentially hostile environments. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs). VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).

AB - The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures, raising the question of security as the application of such systems in potentially hostile environments. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs). VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN).

M3 - Article

VL - 7

SP - 694

EP - 705

JO - International Journal of Intelligent Computing Research (IJICR)

JF - International Journal of Intelligent Computing Research (IJICR)

IS - 2

ER -