43-Yu Shuyao - A security architecture for Mobile Ad Hoc...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
A security architecture for Mobile Ad Hoc Networks Shuyao Yu Youkun Zhang Chuck Song Kai Chen Institute of Computing Technology, School of Software, Computer Network Information Bell Labs Computer Network Information Tsinghua University Center of Chinese Academy Research China Center of Chinese Academy of Sciences of Sciences No.4 South 4th Zhong Guancun F11-5-4A Fenglinluzhou No.4 South 4th Zhong Guancun 15 th floor Hangtian Road,Beijing,China,100108 Datun Road, Beijing,100101 Road Beijing,China,100108 Changcheng Building 86-0-13161674845 86-10-64867270 86-10-62650655 Beijing,China,100080 [email protected] [email protected] [email protected] [email protected] ABSTRACT A Mobile Ad Hoc Network(MANET) is a self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Although security problems in MANETs have attacted much attention in the last few years, most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response, none of the previous work proposes security solutions from a system architectural view. In this paper, we propose a five-layer security architecture for mobile ad hoc networks. A general description of functionalities in each layer is given and we analyze the security mechanisms in military applications in the scope of the proposed security architecture. Keywords Mobile Ad Hoc Network, Security, Authentication, Security Architecture. 1. INTRODUCTION A Mobile Ad Hoc Network(MANET) is a network consisting of a collection of nodes capable of communicating with each other without help from a network infrastructure. Applications of MANETs include the battlefield applications, rescue work, as well as civilian applications like an outdoor meeting, or an ad-hoc classroom. With the increasing number of applications to harness the advantages of Ad Hoc Networks, more concerns arise for security issues in MANETs. The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly , the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering; secondly , the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly , mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms; fourthly , in MANETs, there are more probabilities for trusted node being compromised and then being used by adversary to launch attacks on networks, in another word, we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with; finally , node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course ICT 1 taught by Professor 1 during the Spring '11 term at Kungliga Tekniska högskolan.

Page1 / 4

43-Yu Shuyao - A security architecture for Mobile Ad Hoc...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online