A Novel Key Management Service for Securing Mobile Ad Hoc Networks

aurorabellyΔίκτυα και Επικοινωνίες

21 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

139 εμφανίσεις

A

N
ovel
K
ey
Management S
ervice

for
Securing Mobile Ad Hoc Networks


Paper Presenter:
Kaleem Ahmed USMANI, CDAC School of Advanced Computing

Kavi Kumar KHEDO, University of Mauritius, Raja Krishnamurthy SUBRAMANIAN,
University of Mauritius & Nupur PRAKASH,
University School of IT, GGS Indraprastha
University, Delhi
-
India



Extended Abstract

Mobile ad hoc networks (MANETs) are a new paradigm of wireless communication for mobile
hosts. In mobile ad hoc network, there is no fixed infrastructure such as base sta
tions or mobile
switching centers. Mobile nodes that are within each other's radio range communicate directly
via wireless links, while those that are far apart rely on other nodes to relay messages as routers.
Node mobility in mobile ad hoc network causes

frequent ch
anges of the network topology [1
].
MANETs technology targets networks that can be rapidly deployed or formed in an arbitrary
environment to enable or facilitate communications or to serve a common objective dictated by
the supported application
. Such networks can be heterogeneous, with various types of
equipment, usage, transmission, and mobility patterns. Examples of applications for MANETs
range from military operations and emergency disaster relief to community networking and
interaction amon
g meeting attendees or students during a lecture [2].


The proliferation of this networking paradigm is strongly dependent on the availability of
security provisions. The absence of infrastructure, the nature of the envisioned applications, and
the resour
ce
-
constrained environment pose some new challenges in securing the protocols in the
ad hoc networking environments [3]. In particular, the security requirements c
an differ
significantly from those for infrastructure
-
based networks, while the provision of

security
enhancements may take completely different directions as well.
On one hand, the security
-
sensitive applications of ad hoc networks require high degree of security; on the other hand,
mobile ad hoc networks are inherently vulnerable to security at
tacks. Therefore, security
mechanisms are indispensable for mobile ad hoc networks. The idiosyncrasy of ad hoc networks
poses both challenges and opportunities for these mechanisms.


In this paper, we study the threats
a

mobile
a
d hoc network faces and th
e security goals to be
achieved. We identify the new challenges and opportunities
posed by this networking
environment

and explore new approaches to secure its communication.
We then propose a new
approach
to
address
such a multifaceted and intriguing prob
lem. Finally, we identify some open
problems and
possible solutions.


Indeed, t
his paper focuses on how to secure routing and how to establish a secure key
management service in a mobile ad hoc networking environment. These two issues are essential
to ach
ieving our security goals. Finally, to build a
novel secure key management service which is
highly
available and
secure
, we propose the use of threshold cryptography to distribute trust
among a set of nodes (servers).


The future scope of this paper includ
es the following issues:




Designing efficient routing protocols that have both strong security and high network
performance




The security of routing protocols in the MANETs dynamic
env
ironm
e
nt is an additional
challenge. The self
-
organizing environment int
roduces new security issues that are not
addressed by the basic security services provided for infrastructure
-
based networks.



Another challenging MANETs security problem is the issue of secure routing in the
presence of selfish or adversarial entities whi
ch selectively drop packets they agreed to
forward: and in so doing these entities can disrupt the network traffic and cause various
communication problems.




The intrinsic ability to create generic, small scale, mobile ad hoc networks in portable
devices
and providing security to these devices in ad hoc based applications.


References


[1
]
HU, YIH
-
CHUN, & ADRIAN PERRI
G
.
A survey

of Secure Wireless Ad Hoc Routing
.

IEEE
Security &Privacy, special issue on Making Wireless Work, 2(3), 2004,28
-
39

[2]
P. PAPADI
MITRATOS

& Z.J.
HASS
.

Secure Routing for Mobile Ad hoc Networks
.
Proceedings of SCS Communication Networks
&
Distributed System Modeling
&
Simulation
Conference (CNDS). San Antonio, Texas, January 27
-
31,2002.


[3]
L. ZHOU AND
Z.J.HASS
.
Securing Ad Hoc Netw
orks
.

IEEE Network Magazine,
vol13. no.6
November/December 1999.