2,084 research outputs found
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Resilience and survivability of 5G networks
Title from PDF of title page viewed May 4, 2020Dissertation advisor: Deep MedhiVitaIncludes bibliographical references (page 130-134)Thesis (Ph.D.)--School of Computing and Engineering. University of Missouri--Kansas City, 20205G is going to be the central force behind the Fourth Industrial Revolution. It is the next-generation wireless technology which is slated to provide a wide range of services. It is geared to provide greater capacity, increased energy efficiency, and lower latency. A critical issue in service delivery is to provide resilience in 5G networks.
In this thesis, we present 5G network architecture with network virtualization with multiple providers for network resilience that uses a self-organizing ad hoc network among the gNBs (macrosites). Thus, the primary provider for a 5G network may use a secondary provider for network resilience when network components fail. We present an optimization formulation and a heuristic for network survivability for our proposed 5G network for the primary network provider. Through simulations, we show our proposed heuristic is very close to optimal.
The simulation results on the trade-off between using a provider's own network or rely on auxiliary capacity from another provider allow us to see the trade-off on availability.
We also envision an environment where 5G network resilience is addressed in the presence of unlicensed spectrum and non-terrestrial networks. In this prospect, we present a framework for network survivability with network virtualization with multiple providers, and the use of unlicensed spectrum band and non-terrestrial network (NTN); this is done along with a self-organizing ad hoc network among the gNBs that may use a secondary provider for network resilience when the aggregation network and the backhaul network fails. In this architecture, we present an optimization model for survivability for a 5G networks provider (primary provider) that may also use a secondary provider in the event of a failure along with unlicensed spectrum and NTN. Our simulations show (1) the trade-off between using a primary provider's own network or rely on auxiliary capacity from the secondary provider, and (2) the use of unlicensed spectrum band and NTN enhances the resilience of the network.Introduction -- Research survey -- 5G Architecture for Resilience -- Proposed Optimization and Heuristic for 5G Network Resilience -- Unlicensed Spectrum band and Non-Terrestrial Network -- An Integrated 5G Architecture for Survivability -- Conclusion -- Appendix A. Optimization model file -- Appendix B. Heuristic code -- Appendix C. Topology Generatio
- …