DocumentCode :
2975898
Title :
On the efficiency of establishing and maintaining security associations in tactical MANETs in group formation
Author :
Salmanian, Mazda ; Pan, Li ; Hu, Jiangxin ; Li, Ming
Author_Institution :
Defence R&D Canada, Ottawa, ON, Canada
fYear :
2011
fDate :
7-10 Nov. 2011
Firstpage :
1176
Lastpage :
1182
Abstract :
It has been shown that a Security Association (SA) established by strong authentication between a node pair in a Mobile Ad Hoc Network (MANET) should not depend on link connectivity [1]. While stale (long) SAs should be renewed, SA duration should be managed by a security policy and based on a trust model regardless of link intermittence. Both the security policy and the trust model are modules of a security architecture in [2]. In this paper, we consider nodes in multiple groups using the same channel (one interface) and a hierarchical traffic pattern typical of a tactical operation. We show that the inter-group SAs, between group heads, require a different trust model than that of intra-group SAs if the overhead of authentication is to be kept manageable. We form a new trust model, apply it to the group heads, and adapt their SA duration to their hopped distance away from their authenticators. Our results show that for group heads, the number of hops is a more effective parameter to which their SA duration should be adapted than their actual link distance modeled by FER. Compared to a trust model that adapts to average system FER [2], we show that the new trust model reduces the overhead of authentication for group heads who tend to be multiple hops away from the authenticator. We also show that by relaxing the security policy one can reduce the authentication traffic so that group heads would not be easily detected by the volume of their authentication traffic. Respecting a node´s role in a MANET and its traffic pattern, we show the efficiency and flexibility of the security architecture in keeping the overhead low and reducing the probability of role identification by threat of traffic analysis.
Keywords :
military communication; mobile ad hoc networks; telecommunication security; telecommunication traffic; authentication traffic reduction; group formation; group heads; hierarchical traffic pattern; intergroup security architecture; link connectivity; link distance; link intermittence; mobile ad hoc network; node pair; role identification; security associations; tactical MANET; trust model; Ad hoc networks; Adaptation models; Authentication; IP networks; Mobile computing; Traffic control; Authentication; Mobile ad hoc networks (MANET); OLSR; Security; Trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
ISSN :
2155-7578
Print_ISBN :
978-1-4673-0079-7
Type :
conf
DOI :
10.1109/MILCOM.2011.6127459
Filename :
6127459
Link To Document :
بازگشت