LT1K P04-0283 rev 2.0 - Survey of security for Ad hoc networks

LT1K P04-0283 rev 2.0 - Survey of security for Ad hoc networks

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
ÖPPEN/UNCLASSIFIED REPORT Date FMV Document ID Issue 299/2006 2.0 Unit Subject Code 2007-05-04 AK Led 09 700 Document responsible Assignment ID Reference ID Page Ola Winberg LedsystT LT1K P04-0283 1 (71) © Försvarets materielverk 2007 Survey of security solutions for mobile ad hoc networks Summary This study is a 350-hour project funded by the program “Gemensamt Taktiskt Radio System, Material System 463”. The purpose of this report is to first review the state of the art in mobile ad hoc networks security and then identify the security solutions that are relevant for further discussion. The work results in a conceptual security architecture. However, this document does not define the security solutions to be used in tactical mobile ad hoc networks. This will be dealt with in collaboration with MUST/TSA and FMV. Sammanfattning Denna studie är ett 350-timmarsprojekt som bekostas av program “Gemensamt Taktiskt Radio System, Materiel System 463”. Syftet med denna rapport är att granska ”state of the art” avseende säkerhetslösningar inom ad hoc nätverk samt att identifiera säkerhetslösningar som är relevanta för fortsatta diskussioner. Arbetet har resulterat i en konceptuell säkerhetslösning för användning inom taktiska mobila ad hoc nätverk. Detta kommer fortsättningsvis att hanteras tillsammans med MUST/TSA och FMV. Regarding this document This document is published by Försvarets materielverk, FMV (Swedish Defence Materiel Administration). Improvements and changes to this document necessitated by inaccuracies of current information may be made by FMV at any time and without notice. Such changes will, however, be incorporated into new editions of this document. © Försvarets materielverk 2007. The reader may use this document freely. FMV does not guarantee the accuracy, integrity or quality of this document, or any system built according to this document. FMV is grateful for comments on this document.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ÖPPEN/UNCLASSIFIED REPORT Date FMV Document ID Issue 299/2006 2.0 Unit Subject Code 2007-05-04 AK Led 09 700 Document title Reference ID Page Survey of security solutions for mobile ad hoc networks LT1K P04-0283 2 (71) © Försvarets materielverk 2007
Background image of page 2
ÖPPEN/UNCLASSIFIED REPORT Date FMV Document ID Issue 299/2006 2.0 Unit Subject Code 2007-05-04 AK Led 09 700 Document title Reference ID Page Survey of security solutions for mobile ad hoc networks LT1K P04-0283 3 (71) © Försvarets materielverk 2007 Table of contents 1 GENERAL. ..................................................................................................................................................... 4 1.1 BACKGROUND ........................................................................................................................................................ 4 1.2 SCOPE ................................................................................................................................................................... 4 1.3 REFERENCES ......................................................................................................................................................... 5 2 INTRODUCTION. ......................................................................................................................................... 10 2.1 MOBILE AD HOC NETWORKS ................................................................................................................................. 10 2.2 SECURITY ISSUES IN FOCUS ................................................................................................................................. 10 2.3 ASSUMPTIONS AND LIMITATIONS .......................................................................................................................... 11 2.4 REPORT LAYOUT .................................................................................................................................................. 12 3 CONTEXT (BLACK-BOX). ........................................................................................................................... 13 3.1 PRODUCED SERVICES .......................................................................................................................................... 13 3.2 DEPENDENCIES .................................................................................................................................................... 15 4 INTERNALS (WHITE-BOX) . ........................................................................................................................ 16 4.1 LOGICAL STRUCTURE VIEW .................................................................................................................................. 16 5 AUTHENTICATION AND INTEGRITY (COMMUNICATION SECURITY) . .................................................. 23 5.1 SOLUTIONS IN CURRENT TACTICAL RADIO NETWORKS .......................................................................................... 24 5.2 STANDARDS AND POPULAR SOLUTIONS DEVELOPED FOR WIRED AND WIRELESS NETWORKS ............................... 25 5.3 SOLUTION PROPOSED BY LEDSYSTT ................................................................................................................... 28 5.4 AUTHENTICATION FOR MOBILE AD HOC NETWORKS .............................................................................................. 28 5.5 CONCLUSION AND DISCUSSION ............................................................................................................................ 32 6 KEY MANAGEMENT . .................................................................................................................................. 35 6.1
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 71

LT1K P04-0283 rev 2.0 - Survey of security for Ad hoc networks

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online