radhika_mobisec - Security Measures in Mobile Ad hoc...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Measures in Mobile  Ad hoc Networks - Radhika Apte CIS6930 Advanced  Cryptography  1/18/12  1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cellular Networks 802.11 MANETs Key characteristics: Every node is a router Every node moves No special node Advantage of MANETs: Quick formation of network No pre-established infrastructure Little human configuration required Self- heal capability Motivation 1/18/12  2
Background image of page 2
Application of MANETs Battlefield environments Emergency response Vehicular Networks Sensor Deployment Continued… 1/18/12  3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Absence of Infrastructure Wireless Links between the nodes Limited Physical Protection Lack of a Centralized Monitoring or Management Unit Resource constraints Ad hoc Network Vulnerabilities 1/18/12  4
Background image of page 4
Passive Attacks Passive link intrusion Passive node intrusion Active Attacks Impersonation Masquerade Replay Modification DOS Jamming Energy Exhaustion Attack Attacks in Ad hoc Network 1/18/12  5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Focus mainly on secured routing protocols Secured key distribution and management is neglected Pre-existence and pre-sharing of secret and public key is assumed Ad hoc network key management is an open problem Distribution of key in ad hoc networks mirrors TRUST relations A scheme efficient and feasible for resource constrained devices is needed Current state of security in ad  hoc networks 1/18/12  6
Background image of page 6
Proactive Approach Prevent an attacker from launching an attack initially Reactive Approach Detect security threat and react accordingly Other Measures Threshold Cryptography Certificate Authorities Reputation Schemes Authentication Security Measures 1/18/12  7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
(k , n) threshold cryptography scheme by Shamir Secret split into shares such that for certain threshold k < n , any k components combine to form a valid signature
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 22

radhika_mobisec - Security Measures in Mobile Ad hoc...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online