Journal of Systems Engineering and Electronics ›› 2008, Vol. 19 ›› Issue (2): 391-397.

• COMPUTER DEVELOPMENT AND PRACTICE • Previous Articles     Next Articles

Multilevel security model for ad hoc networks

Wang Changda1,2 & Ju Shiguang1   

  1. 1. School of Computer Science and Telecommunications Engineering, Jiangsu Univ., Jiangsu 212013, P. R. China;
    2. School of Computer Science, Carleton Univ., Ottawa, Ontario K1S 5B6, Canada
  • Online:2008-04-21 Published:2010-01-03

Abstract:

Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.