The choice of schemes for securing mobile ad hoc

Info icon This preview shows pages 42–44. Sign up to view the full content.

required, and the overhead that can be tolerated. The choice of schemes for securing mobile ad hoc networks (MANETs) is especially challeng- ing due to many of its unique constraints. This chapter provides an in-depth look at various factors that influence the choice of KDSs for MANETs. Several schemes are explored with regard to their suitability for MANETs. 1. Introduction Devices forming mobile ad hoc networks (MANETs) cooperate with each other for routing packets. Through mutual cooperation, MANETs elimi- nate the need for a dedicated infrastructure for routing packets. Due to their reduced dependence on infrastructure, MANETs can be quickly de- ployed in rural areas where no infrastructure exists. MANETs are also appealing in dense urban areas due to the high cost of acquiring real estate for erecting communication infrastructure. Mahalingam Ramkumar has been an Assistant Professor since August 2003. His pri- mary area of research is security solutions for large-scale networks constituted by resource limited devices. MSU (established in 1862) is a land-grant university, designated as a Doctoral/Extensive institution by the Carnegie Foundation for the Advancement of Teaching. The Dept. of CSE is a part of the Bagley College of Engineering at MSU. 29 Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 42

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

30 M. Ramkumar Securing MANETs calls for proactive strategies to ensure that all par- ticipants (mobile devices and gateways) act in a fair manner. One of the important facilitators for such proactive strategies is cryptographic authen- tication , which depends on key distribution schemes (KDS). From a broad perspective, a KDS for a network is a mechanism for distributing secrets to all subscribers (or entities, or MANET devices, or nodes) that are inducted into the network. The secrets assigned to a node are used for establish- ing cryptographic security associations (SA) with other nodes. Packets originating from nodes without a valid authentication will simply be disre- garded by other nodes. Thus, the secrets assigned to a subscriber confers the eligibility for the subscriber to take part in the network. 1.1. Requirements and Constraints In general, the choice of key distribution schemes for any application has to consider several factors like 1) the scope of cryptographic SAs; 2) different types of SAs that are required; and 3) overhead necessary for this purpose. 1.1.1. Scope of Cryptographic Security Associations Any security solution can be broadly classified into preventive and correc- tive measures. For MANETs, where every node is expected to adhere to some rules (the rules prescribed by the ad hoc routing protocol) preven- tive measures may involve use of trustworthy computing modules to ensure adherence to rules. Corrective measures cater to the failure of preventive
Image of page 43
Image of page 44
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern