01207138-- - Routing Security and Data Confidentiality for...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Routing Security and Data Confidentiality for Mobile Ad hoc Networks Keng Seng NG Dept. of Electrical & Computer Engineering National University of Singapore 10 Kent Ridge Crescent Singapore I19260 [email protected] Abstract - A Mobile Ad hoe Network (MANET) is B collection of mobile nodes lhat forms B provisional nelwork dynamically without the aid of any predetermined infrastructure. The salient nature of ad hoe nehwrks render lhem vulnerable to numerous types of security attacks. The dynamic feature of ad hoc networks makos enforcement of security becomes an extremely challenging issue. The main problem of many proposed routing protoeoli for sd hoc networks lhal these protocols have erilierl susceplibilities to securily attacks. Effective operation of ad hoc networks depends on the mainlensnee of correct routing information the network. Nevertheless, securing routing protocols wilhout securing network lranrminsions is no1 enough. As B result, our major focuses are to secure the routing protocol and likewise to protect data Iranrmirsion. In this paper. we preienl the Secure Routing Prolocol (SEROP) which achiever data confidentiality and secures the routing protocol for mobile ad hoc nehvorks without demanding any unrealistic assumptions. I. INTRODUCTION Mobile Ad hoc Networks (MANETs) are made up of autonomous, collaborative mobile nodes with the ability to self-organize dynamically. Multi-hop routing capability is required for each node that wants to set up a connection with another node not in its radio range. The responsibility of network management rests completely on the nodes even though they have unlimited mobility and connectivity. An ad hoc network is essential in circumstances where the terrestrial restrictions require an entirely distributed network system without any permanent base stations. The prominent features of ad hoc networks render them susceptible to several kinds of security attacks [9]. Wireless networks are naturally more vulnerable to link attacks such as eavesdropping because it merely requires physical adjacency to gain access to the medium. The spontaneous creation of the ad hoc networks makes it very difficult to differentiate between trusted and non-trusted nodes. An ad hoc network is dynamic because the nodes may leave and join the network anytime they wish. Consequently, the bust relationships * Institute for lnfocomm Ressarch (1%) is a national R&D insticute hrnded by the Agency for Science, Technology and Research (ATTAR) of Singapore. Winston K. G. SEAH Institute for lnfocomm Research 20 Science Park Road, #02-34/37 TeleTech Park Singapore Science Park I1 Singapore 117674 [email protected] between nodes change regularly as well. Any recommended security mechanisms with fixed arrangements would not be adequate. It is advantageous that the security solutions are capable of adapting on the fly to those changes and are scalable to handle a large network.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course ICT 1 taught by Professor 1 during the Spring '11 term at Kungliga Tekniska högskolan.

Page1 / 5

01207138-- - Routing Security and Data Confidentiality for...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online