Abstract
Security is a paramount concern in mobile ad hoc network (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In this chapter, we analyze the security problems in MANET and present a few promising research directions. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders, and various secure MANET routing protocols have been proposed to prevent internal attacks originated from within the MANET system. On the intrusion detection side, a new intrusion detection framework has been studied especially for MANET. Both prevention and detection methods will work together to address the security concerns in MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 207–216, 1993.
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2002.
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139–145, 2001.
R. Blom. An optimal class of symmetric key generation systems. In Advances in Cryptology, EUROCRYPT’84, LNCS 209, pages 335–338, 1984.
L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Y. Xu, and H. Yu. Advances in network simulation. IEEE Computer, 33(5):59–67, May 2000.
S. Buchegger and J. L. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403–410, Canary Islands, Spain, January 2002. IEEE Computer Society.
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks. In Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne, Switzerland, June 2002.
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003.
T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and A. Qayyum et L. Viennot. Optimized link state routing protocol. In Proceedings of IEEE International Multi-Topic Conference(INMIC), Pakistan, 2001.
W. W. Cohen. Fast effective rule induction. In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.
J. R. Douceur. The sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pages 251–260, March 2002. LNCS 2429.
W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003.
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, Washington D.C., November 2002.
Z.J. Haas and M. R. Pearlman. The zone routing protocol (ZRP) for ad hoc networks. Internet draft draft-ietf-manet-zone-zrp-04.txt, expired 2003, July 2000.
C. Hsin and M. Liu. A distributed monitoring mechanism for wireless sensor networks. In ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002.
Y. Hu, D. Johnson, and A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1): 175–192, July 2003.
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM’02, 2002.
Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM’03, 2003.
Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of ACM MobiCom Workshop-WiSe’03, 2003.
Jean-Pierre Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
S. Jacobs and M. S. Corson. MANET authentication architecture. Internet draftdraft-jacobs-imep-auth-arch-01.txt, expired 2000, February 1999.
T. Joachims. Making large-scale SVM learning practical, chapter 11. MIT-Press, 1999.
D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Tomasz Imielinski and Hank Korth, editors, Mobile Computing, pages 153–181. Kluwer Academic Publishers, 1996.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the IEEE International Conference on Network Protocols, Riverside, CA, November 2001.
W. Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD thesis, Columbia University, June 1999.
H. Mannila, H. Toivonen, and A. I. Verkamo. Discovering frequent episodes in sequences. In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995.
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, August 2000.
T. Mitchell. Machine Learning. McGraw-Hill, 1997.
P. Papadimitratos and Z. J. Hass. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002.
C. Partridge, D. Cousins, A. W. Jackson, R. Krishman, T. Saxena, and W. T. Strayer. Using signal processing to analyze wireless data traffic. In ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002.
C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM’ 94 Conference on Communications Architectures, Protocols and Applications, pages 234–244, 1994.
C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector routing. In 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, New Orleans, LA, February 1999.
A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor networks. In Mobile Computing and Networking, pages 189–199, 2001.
J. R. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, CA, 1993.
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of ICNP’ 02, 2002.
M. Satyanarayanan, J. J. Kistler, L. B. Mummert, M. R. Ebling, P. Kumar, and Q. Lu. Experiences with disconnected operation in a mobile environment. In Proceedings of USENIX Symposium on Mobile and Location Independent Computing, pages 11–28, Cambridge, Massachusetts, August 1993.
B. Schneier. Secrets & Lies: Digital Security in a Networked World. John Wiley & Sons, Inc., 2000.
B. R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, pages 85–92, San Diego, California, February 1997.
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. Security Protocols. 7th International Workshop Proceedings, Lecture Notes in Computer Science, pages 172–194, 1999.
M. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, September 2002.
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pages 275–283, Boston, Massachusetts, August 2000.
Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks Journal, 9(5):545–556, September 2003.
L. Zhou and Z. J. Haas. Securing ah hoc networks. IEEE Network, 13(6):24–30, Nov/Dec 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Zhang, Y., Lee, W. (2005). Security in Mobile Ad-Hoc Networks. In: Mohapatra, P., Krishnamurthy, S.V. (eds) Ad Hoc Networks. Springer, Boston, MA. https://doi.org/10.1007/0-387-22690-7_9
Download citation
DOI: https://doi.org/10.1007/0-387-22690-7_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-22689-7
Online ISBN: 978-0-387-22690-3
eBook Packages: EngineeringEngineering (R0)