10.1.1.103.9855 - Security in Ad Hoc Networks: a General...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches Patrick Albers 1 , Olivier Camp 1 , Jean-Marc Percher 1 , Bernard Jouga 2 , Ludovic M´ e 2 , and Ricardo Puttini 2 1 ´ Ecole Sup´ erieure d’ ´ Electronique de l’Ouest (ESEO), 4, rue Merlet de la Boulaye, 49000 Angers, France { patrick.albers,olivier.camp,jean-marc.percher } @eseo.fr 2 Sup´ elec, BP 81127, Cedex 35511 Cesson S´ evign´ e, France { bernard.jouga,ludovic.me,ricardo.puttini } @supelec.fr Abstract. In the last few years, the performances of wireless technolo- gies have increased tremendously thus opening new fields of applica- tion in the domain of networking. One of such fields concerns mobile ad hoc networks (MANETs) in which mobile nodes organise themselves in a network without the help of any predefined infrastructure. Securing MANETs is just as important, if not more, as securing traditional wired networks. Existing solutions can be used to obtain a certain level of secu- rity. Nevertheless, these solutions may not always be suitable to wireless networks. Furthermore, ad hoc networks have their own vulnerabilities that cannot be tackled by these solutions. To obtain an acceptable level of security in such a context, traditional security solutions should be coupled with an intrusion detection mechanism. In this paper we show how ad hoc networks can be, to a certain extent, secured using traditional techniques. We then examine the different in- trusion detection techniques and point out the reasons why they usually cannot be used in an ad hoc context. Finally, we go through the require- ments of an intrusion detection system for ad hoc networks, and define an adapted architecture for an intrusion detection system for manets. 1 Introduction Mobile ad hoc (or spontaneous) networks (manet) are IP networks made up of a collection of wireless and mobile nodes communicating via radio links. They do not depend on any predefined infrastructure or centralised administration to operate [5] and could, for example, find applications in the case of networks created for the needs of participants to a conference or meeting [9], students and teachers in a classroom, rescuers in a search and rescue operation, soldiers on a battlefield . . . 2 Authors Suppressed Due to Excessive Length Ad hoc networks can either be standalone networks (this would be the case of a spontaneous network created for the needs of a meeting between participants away from their home network -for example an airport or a hotel lounge) or peripheral networks connected, for instance, to a wired local area network or to the Internet (this would certainly be the case for a virtual classroom where students need to intercommunicate and may need to access documentation on the web or in the school’s digital library)....
View Full Document

Page1 / 12

10.1.1.103.9855 - Security in Ad Hoc Networks: a General...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online