theory on IDS ad hoc - WIRELESS/MOBILE NETWORK SECURITY Y....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. – - – c 2006 Springer Chapter 12 A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei Department of Computer Science and Engineering Florida Atlantic University E-mail: { bwu, jchen8 } @fau.edu, { jie, mihaela } @cse.fau.edu 1 Abstract Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics of MANET pose both chal- lenges and opportunities in achieving security goals, such as confidentiality, au- thentication, integrity, availability, access control, and non-repudiation. We pro- vide a survey on attacks and countermeasures in MANET in this paper. The coun- termeasures are features or functions that reduce or eliminate security vulnerabil- ities and attacks. First, we give an overview of attacks according to the protocols stacks, and to security attributes and mechanisms. Then we present preventive ap- proaches following the order of the layered protocol stacks. We also put forward an overview of MANET intrusion detection systems (IDS), which are reactive ap- proaches to thwart attacks and used as a second line of defense. 2 Introduction In a MANET, a collection of mobile hosts with wireless network interfaces form a temporary network without the aid of any fixed infrastructure or centralized admin- istration. A MANET is referred to as an infrastructureless network because the mo- bile nodes in the network dynamically set up paths among themselves to transmit 1 packets temporarily. In a MANET, nodes within each other’s wireless transmis- sion ranges can communicate directly; however, nodes outside each other’s range have to rely on some other nodes to relay messages [22]. Thus, a multi-hop sce- nario occurs, where several intermediate hosts relay the packets sent by the source host before they reach the destination host. Every node functions as a router. The success of communication highly depends on other nodes’ cooperation. In 1996, The Internet Engineering Task Force(IETF) set down a MANET work- group, and its goal is to standardize IP routing protocol functionality suitable for wireless routing applications within both static and dynamic topologies. A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni- directional (broadcast), highly-directional (point-to-point), or some combination thereof. At a given time, the system can be viewed as a random graph due to the movement of the nodes, their transmitter/receiver coverage patterns, the transmis- sion power levels, and the co-channel interference levels. The network topology may change with time as the nodes move or adjust their transmission and recep-...
View Full Document

This note was uploaded on 03/19/2012 for the course COMPUTER S 2143 taught by Professor Singh during the Spring '12 term at Punjab Engineering College.

Page1 / 38

theory on IDS ad hoc - WIRELESS/MOBILE NETWORK SECURITY Y....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online