Skip to main content

Security in Mobile Ad-Hoc Networks

  • Chapter
Ad Hoc Networks

Abstract

Security is a paramount concern in mobile ad hoc network (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In this chapter, we analyze the security problems in MANET and present a few promising research directions. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders, and various secure MANET routing protocols have been proposed to prevent internal attacks originated from within the MANET system. On the intrusion detection side, a new intrusion detection framework has been studied especially for MANET. Both prevention and detection methods will work together to address the security concerns in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 207–216, 1993.

    Google Scholar 

  2. D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2002.

    Google Scholar 

  3. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.

    Google Scholar 

  4. J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139–145, 2001.

    Article  MATH  Google Scholar 

  5. R. Blom. An optimal class of symmetric key generation systems. In Advances in Cryptology, EUROCRYPT’84, LNCS 209, pages 335–338, 1984.

    Google Scholar 

  6. L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Y. Xu, and H. Yu. Advances in network simulation. IEEE Computer, 33(5):59–67, May 2000.

    Google Scholar 

  7. S. Buchegger and J. L. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403–410, Canary Islands, Spain, January 2002. IEEE Computer Society.

    Google Scholar 

  8. S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks. In Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne, Switzerland, June 2002.

    Google Scholar 

  9. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003.

    Google Scholar 

  10. T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and A. Qayyum et L. Viennot. Optimized link state routing protocol. In Proceedings of IEEE International Multi-Topic Conference(INMIC), Pakistan, 2001.

    Google Scholar 

  11. W. W. Cohen. Fast effective rule induction. In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.

    Google Scholar 

  12. J. R. Douceur. The sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pages 251–260, March 2002. LNCS 2429.

    Google Scholar 

  13. W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003.

    Google Scholar 

  14. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, Washington D.C., November 2002.

    Google Scholar 

  15. Z.J. Haas and M. R. Pearlman. The zone routing protocol (ZRP) for ad hoc networks. Internet draft draft-ietf-manet-zone-zrp-04.txt, expired 2003, July 2000.

    Google Scholar 

  16. C. Hsin and M. Liu. A distributed monitoring mechanism for wireless sensor networks. In ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002.

    Google Scholar 

  17. Y. Hu, D. Johnson, and A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1): 175–192, July 2003.

    Article  Google Scholar 

  18. Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM’02, 2002.

    Google Scholar 

  19. Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM’03, 2003.

    Google Scholar 

  20. Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of ACM MobiCom Workshop-WiSe’03, 2003.

    Google Scholar 

  21. Jean-Pierre Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.

    Google Scholar 

  22. S. Jacobs and M. S. Corson. MANET authentication architecture. Internet draftdraft-jacobs-imep-auth-arch-01.txt, expired 2000, February 1999.

    Google Scholar 

  23. T. Joachims. Making large-scale SVM learning practical, chapter 11. MIT-Press, 1999.

    Google Scholar 

  24. D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, pages 153–181. Kluwer Academic Publishers, 1996.

    Google Scholar 

  25. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the IEEE International Conference on Network Protocols, Riverside, CA, November 2001.

    Google Scholar 

  26. W. Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD thesis, Columbia University, June 1999.

    Google Scholar 

  27. H. Mannila, H. Toivonen, and A. I. Verkamo. Discovering frequent episodes in sequences. In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995.

    Google Scholar 

  28. S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, August 2000.

    Google Scholar 

  29. T. Mitchell. Machine Learning. McGraw-Hill, 1997.

    Google Scholar 

  30. P. Papadimitratos and Z. J. Hass. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002.

    Google Scholar 

  31. C. Partridge, D. Cousins, A. W. Jackson, R. Krishman, T. Saxena, and W. T. Strayer. Using signal processing to analyze wireless data traffic. In ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002.

    Google Scholar 

  32. C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM’ 94 Conference on Communications Architectures, Protocols and Applications, pages 234–244, 1994.

    Google Scholar 

  33. C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector routing. In 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, New Orleans, LA, February 1999.

    Google Scholar 

  34. A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.

    Google Scholar 

  35. A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor networks. In Mobile Computing and Networking, pages 189–199, 2001.

    Google Scholar 

  36. J. R. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, CA, 1993.

    Google Scholar 

  37. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of ICNP’ 02, 2002.

    Google Scholar 

  38. M. Satyanarayanan, J. J. Kistler, L. B. Mummert, M. R. Ebling, P. Kumar, and Q. Lu. Experiences with disconnected operation in a mobile environment. In Proceedings of USENIX Symposium on Mobile and Location Independent Computing, pages 11–28, Cambridge, Massachusetts, August 1993.

    Google Scholar 

  39. B. Schneier. Secrets & Lies: Digital Security in a Networked World. John Wiley & Sons, Inc., 2000.

    Google Scholar 

  40. B. R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, pages 85–92, San Diego, California, February 1997.

    Google Scholar 

  41. F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. Security Protocols. 7th International Workshop Proceedings, Lecture Notes in Computer Science, pages 172–194, 1999.

    Google Scholar 

  42. M. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, September 2002.

    Google Scholar 

  43. Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pages 275–283, Boston, Massachusetts, August 2000.

    Google Scholar 

  44. Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks Journal, 9(5):545–556, September 2003.

    Article  Google Scholar 

  45. L. Zhou and Z. J. Haas. Securing ah hoc networks. IEEE Network, 13(6):24–30, Nov/Dec 1999.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Zhang, Y., Lee, W. (2005). Security in Mobile Ad-Hoc Networks. In: Mohapatra, P., Krishnamurthy, S.V. (eds) Ad Hoc Networks. Springer, Boston, MA. https://doi.org/10.1007/0-387-22690-7_9

Download citation

  • DOI: https://doi.org/10.1007/0-387-22690-7_9

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-22689-7

  • Online ISBN: 978-0-387-22690-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics