2,084 research outputs found

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Full text link
    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other author

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Resilience and survivability of 5G networks

    Get PDF
    Title from PDF of title page viewed May 4, 2020Dissertation advisor: Deep MedhiVitaIncludes bibliographical references (page 130-134)Thesis (Ph.D.)--School of Computing and Engineering. University of Missouri--Kansas City, 20205G is going to be the central force behind the Fourth Industrial Revolution. It is the next-generation wireless technology which is slated to provide a wide range of services. It is geared to provide greater capacity, increased energy efficiency, and lower latency. A critical issue in service delivery is to provide resilience in 5G networks. In this thesis, we present 5G network architecture with network virtualization with multiple providers for network resilience that uses a self-organizing ad hoc network among the gNBs (macrosites). Thus, the primary provider for a 5G network may use a secondary provider for network resilience when network components fail. We present an optimization formulation and a heuristic for network survivability for our proposed 5G network for the primary network provider. Through simulations, we show our proposed heuristic is very close to optimal. The simulation results on the trade-off between using a provider's own network or rely on auxiliary capacity from another provider allow us to see the trade-off on availability. We also envision an environment where 5G network resilience is addressed in the presence of unlicensed spectrum and non-terrestrial networks. In this prospect, we present a framework for network survivability with network virtualization with multiple providers, and the use of unlicensed spectrum band and non-terrestrial network (NTN); this is done along with a self-organizing ad hoc network among the gNBs that may use a secondary provider for network resilience when the aggregation network and the backhaul network fails. In this architecture, we present an optimization model for survivability for a 5G networks provider (primary provider) that may also use a secondary provider in the event of a failure along with unlicensed spectrum and NTN. Our simulations show (1) the trade-off between using a primary provider's own network or rely on auxiliary capacity from the secondary provider, and (2) the use of unlicensed spectrum band and NTN enhances the resilience of the network.Introduction -- Research survey -- 5G Architecture for Resilience -- Proposed Optimization and Heuristic for 5G Network Resilience -- Unlicensed Spectrum band and Non-Terrestrial Network -- An Integrated 5G Architecture for Survivability -- Conclusion -- Appendix A. Optimization model file -- Appendix B. Heuristic code -- Appendix C. Topology Generatio
    • …
    corecore