SecurityAdHocNetworks - Securing Ad Hoc Networks Lidong...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Securing Ad Hoc Networks Lidong Zhou and Zygmunt J. Haas Cornell University Abstract Ad hoc networks are a new wireless networking paradigm far mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure, Instead, hosts rely on each other to keep the network connected. Mil- itary tactical and other security-sensitive operations are still the main a plications of ad hoc networks, although there is a trend to adopt ad hoc networe for com- merciol uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats an ad hoc network faces and the security goals to be achieved. We identi- Fy the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundoncy in ad hoc networks - multiple routes between nodes - to defend routing a ainst denial-of-service attacks. We olso use replication and new cryptogra hic sc\emes, such as threshold crypto raphy, to build a hi hly secure and high1 available key management service, wfich forms the core o 9 our security framework. d hoc netwnrks arc a iicw paradigm of wireless commuiiication for mohile hosts (which wc call nodes). In an ad hoc nctwork, thcre is no fixed inlrastructurc such as basc stations or mobilc switching centers. Mobile iiodcs withiti cach othcr's radio r;ingc cnmmunicatc directly via wirclcss links, while thosc that arc far apart rcly on othcr nodcs to relay messages as rn~itcrs. Node mohility in an ad lioc network causes frcquenl changcs of nct- work topology. Figurc I shows an examplc: initially, nodcs A and D llavc ii direct link bctwccii thcm. Whcn D movcs out ol A's radio range, thc link is broken. However, thc nctwork is still cnnncctcd, hccausc A caii rcach D through C, E, and F. Mililary tactical opcrations iirc still tlic main application of ad hac networks today. b'nr cxmnplc, military units (c.g., sol- dicrs, tanks, or planes), cquippcd with wirclcss communice- tioii dcvices, could form an ad hoc nctwork when thcy roam in a battlcficld. Ad hoc networks can ;ilso lie uscd for emcr- gency, law enforcement, and rescuc missions. Sincc an ad hoc network caii be deployed rapidly with relatively low cost, it bccomes iui attractivc option fnr commcrcial uscs such as scn- SOS nctworks or virtual classrooms. Security Gods Security is an important issuc for ad hoc nctworks, espccially for sccurity-scnsitive applications. To sccure :in ad hoc net- work, we consider tlic fallowing attributes: availabilify, conpi- dentiaiulity, integrity, nutlienticalion, and nonrepudiation. Availabilily ensurcs the survivability or nctwork services despite dcnial-of-servicc attacks.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

SecurityAdHocNetworks - Securing Ad Hoc Networks Lidong...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online