4,541 research outputs found
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Security Verification of Secure MANET Routing Protocols
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure. The framework is applied to models of the Optimized Link-State Routing (OLSR) and Secure OLSR protocol against five attack vectors. These vectors are based on known attacks against each protocol. Vulnerabilities consistent with published findings are automatically revealed. No unknown attacks were found; however, future attack vectors may lead to new attacks. The new framework for verifying secure MANET protocols extends verification capabilities to table-based and proactive protocols
Improving The Fault Tolerance of Ad Hoc Routing Protocols using Aspect-oriented Programming
[ES] Las redes ad hoc son redes inalámbricas distribuidas formadas por nodos móviles que se ubican
libremente y dinámicamente, capaces de organizarse de manera propia en topologías arbitrarias y
temporales, a través de la actuación de los protocolos de encaminamiento. Estas redes permiten a las
personas y dispositivos conectarse sin problemas rápidamente, en áreas sin una infraestructura de
comunicaciones previa y con un bajo coste. Muchos estudios demuestran que los protocolos de
encaminamiento ad hoc se ven amenazados por una variedad de fallos accidentales y maliciosos, como
la saturación de vecinos, que puede afectar a cualquier tipo de red ad hoc, y el ruido ambiental, que
puede afectar en general a todas las redes inalámbricas. Por lo tanto, el desarrollo y la implementación
de estrategias de tolerancia a fallos para mitigar el efecto de las fallos, es esencial para el uso práctico
de este tipo de redes. Sin embargo, los mecanismos de tolerancia a fallos suelen estar implementados
de manera específica, dentro del código fuente de los protocolos de encaminamiento que hace que i)
ser reescrito y reorganizado cada vez que una nueva versión de un protocolo se libera, y ii) tener un
carácter completamente remodelado y adaptado a las nuevas versiones de los protocolos. Esta tesis de
máster explora la viabilidad de utilizar programación orientada a aspectos (AOP), para desarrollar e
implementar los mecanismos de tolerancia a fallos adecuados para toda una familia de protocolos de
encaminamiento, es decir, las versiones actuales y futuras de un protocolo determinado (OLSR en este
caso). Por otra parte, se propone una nueva metodología para ampliar estos mecanismos a diferentes
familias de protocolos proactivos (OLSR, BATMAN y Babel) con un nuevo concepto de AOP, el metaaspecto.
La viabilidad y efectividad de la propuesta se ha evaluado experimentalmente, estableciendo
así un nuevo método para mejorar la implementación de la portabilidad y facilidad de mantenimiento
de los mecanismos de tolerancia a fallos en los protocolos de enrutamiento ad hoc y, por lo tanto, la
fiabilidad de las redes ad hoc.[EN] Ad hoc networks are distributed networks consisting of wireless mobile nodes that can freely and
dynamically self-organize into arbitrary and temporary topologies, through the operation of routing
protocols. These networks allow people and devices to seamlessly interconnect rapidly in areas with no
pre-existing communication infrastructure and with a low cost. Many studies show that ad hoc routing
protocols are threatened by a variety of accidental and malicious faults, like neighbour saturation,
which may affect any kind of ad hoc network, and ambient noise, which may impact all wireless
networks in general. Therefore, developing and deploying fault tolerance strategies to mitigate the
effect of such faults is essential for the practical use of this kind of networks. However, those fault
tolerance mechanisms are usually embedded into the source code of routing protocols which causes
that i) they must be rewritten and redeployed whenever a new version of a protocol is released, and ii)
they must be completely redeveloped and adapted to new routing protocols. This master thesis
explores the feasibility of using Aspect-Oriented Programming (AOP) to develop and deploy fault
tolerance mechanisms suitable for a whole family of routing protocols, i.e. existing and future versions
of a given protocol (OLSR in this case). Furthermore, a new methodology is proposed to extend these
mechanisms to different families of proactive protocols (OLSR, B.A.T.M.A.N and Babel) using a new
concept in AOP, the meta-aspect. The feasibility and effectiveness of the proposal is experimentally
assessed, thus establishing a new method to improve the deployment, portability, and maintainability
of fault tolerance mechanisms for ad hoc routing protocols and, therefore, the dependability of ad hoc
networks.Bustos Rodríguez, AJ. (2012). Improving The Fault Tolerance of Ad Hoc Routing Protocols using Aspect-oriented Programming. http://hdl.handle.net/10251/18421Archivo delegad
A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks
Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network2019;s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routingdisruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
- …