91 research outputs found

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    On the Role of 5G and Beyond Sidelink Communication in Multi-Hop Tactical Networks

    Full text link
    This work investigates the potential of 5G and beyond sidelink (SL) communication to support multi-hop tactical networks. We first provide a technical and historical overview of 3GPP SL standardization activities, and then consider applications to current problems of interest in tactical networking. We consider a number of multi-hop routing techniques which are expected to be of interest for SL-enabled multi-hop tactical networking and examine open-source tools useful for network emulation. Finally, we discuss relevant research directions which may be of interest for 5G SL-enabled tactical communications, namely the integration of RF sensing and positioning, as well as emerging machine learning tools such as federated and decentralized learning, which may be of great interest for resource allocation and routing problems that arise in tactical applications. We conclude by summarizing recent developments in the 5G SL literature and provide guidelines for future research.Comment: 6 pages, 4 figures. To be presented at 2023 IEEE MILCOM Workshops, Boston, M

    A Survey of Security Challenges and Issues in Manet

    Get PDF
    Nodes intriguing element in Mobile Ad-hoc Networks (MANET) are predictable to hold to the rules stated by the routing protocol utilized in the network. Safe routing protocols endeavor to decrease the ill-effect of nodes under the control of malicious entities who intentionally violate the protocol.. There are so many generic tools which are universal for individual as well as organizations for customers to offer protection which comprises Antivirus, Ant spam, etc., and network securities have turn into important issue in MANET. Security is one of the major issues in the MANET particularly w.r.t. complexity and size of the network. The main focus of this survey is to discuss & represent special characteristics of security in MANET and also apply several of the solutions security threats within MANET network similar to intruder activities, tapping and integrity, MANET link layer and network layer operations w.r.t. information security etc) w.r.t. MANET network. This Survey paper also discusses different number of security scenarios of MANET, Attacks in MANET and IDS in MANET. Keywords: AODV, MANET, Network Security, IDS, Attack

    Implementation of a Regression-based Trust Model in a Wireless Ad hoc Testbed

    Get PDF
    Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust based security modelling go hand in hand with cryptographic services to offer good security services. We have implemented a vector auto regression (VAR) based trust model over ad hoc on demand distance vector protocol and optimised link state routing protocol. The novelty in this model lies in  capturing individual functional behaviours of a neighbour in an ad hoc network and modeling them as regression parameters. The experimental results show the feasibility of implementing trust models over real ad hoc network deployments. The simulations results show that the proposed VAR trust model offers better performance compared to the existing trust models.Defence Science Journal, 2012, 62(1), pp.167-173, DOI:http://dx.doi.org/10.14429/dsj.62.143

    Performance Evaluation of AODV with and without Black hole Attack in MANETs

    Get PDF
    A Wireless ad-hoc network is a temporary network where several mobileindependent nodes can move freely in any direction. With the help of routing protocols source node locates a path to the target node and forward data packets through intermediate nodes.However, due to mobility and ad-hoc nature, security becomes an important issue in MANET because once malicious nodes are in the range of networks; they can join the network freely and degrades the performance by attacking it. The vulnerability of MANET is very high towards routing attacks such as blackhole, which drops all the packets instead of forwarding it to the targeted node andresults in data loss. This research paper focuses on analyzing the performance of AODV with various parameters such as throughput, packet delivery ratio, normalized routing load and average end-to-end delay using different scenariosof network configuration with and without blackhole attack in MANET

    A parallel prevention algorithm for black hole attacks in MANET

    Get PDF
    In this paper, we propose a parallel algorithm for MANETs that optimizes both routing discovery and security in an Ad Hoc On Demand Distance Vector (AODV). The new algorithm, termed as Parallel Grid Optimization by the Daddy Long-Legs Algorithm (PGO-DLLA), simulates the behavior of the biological spiders known as daddy long-legs spiders.Experiments were conducted on an NS2 simulator to demonstrate the efficiency and robustness of the proposed algorithm.The results indicate better performance than the AntNet algorithm with respect to all metrics that used in experiments such as packet delivery ratio (PDR), end-to-end delay (EtoE) and Packet loss (PL) except throughput, for which AntNet is the better algorithm.In addition, the results show that PGO-DLLA outperforms the standard AODV algorithm in simulations of both a peaceful environment and a hostile environment represented by a black hole attacks

    Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming

    Get PDF
    In support of the Air Force Research Laboratory\u27s (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV placement to support ad-hoc network capability, while maintaining the valuable service of surveillance activities

    Initial design and concept of operations for a clandestine data relay UUV to circumvent jungle canopy effects on satellite communications

    Get PDF
    Communications within jungle environments has always been a difficult proposition. This is especially true of collection assets beneath triple canopy jungle that need to communicate with overhead national assets. The traditional methods of countering the negative effects of the canopy on EM signals have been to increase the power to offset the losses, or to utilize new, more canopy transparent portions of the EM spectrum. However, there are complications with both of these methods. Simply increasing transmitted power increases the drain on the system's power supply, thus lowering effective on-station time. Shifting to a different portion of the EM spectrum can negatively affect the transmission rate of the system and requires specialized equipment such as antennas and modulators. This work addresses the issue by designing a semi-autonomous UUV, which will clandestinely relay data from the embedded jungle systems to overhead national assets. Rather than trying to punch through the canopy directly, the proposed UUV will take advantage of the fact that most jungle water ways have, at the very least, a thinner canopy overhead if not a clear view of the sky for less lossy satellite communications. This shifts the primary communications from an Earth-Sky problem to a lateral wave model where the communications travels parallel to the canopy. While the jungle is still not an ideal medium for communications, other methods can be used to address these losses. The proposed UUV will be designed to be cheap and constructed from existing systems. It will also be small, and lightweight, enough to be delivered and deployed in theater via aircraft, boats, and operators on the ground. Additionally it will be capable of long on station times due to the ability recharge on station.http://archive.org/details/initialdesignndc109455537Approved for public release; distribution is unlimited
    • …
    corecore