DocumentCode :
3177186
Title :
Scalable security schemes for ad hoc networks
Author :
Bhargava, Sonali ; Agrawal, Dharma P.
Author_Institution :
Center for Distributed & Mobile Comput., Cincinnati Univ., OH, USA
Volume :
2
fYear :
2002
fDate :
7-10 Oct. 2002
Firstpage :
1089
Abstract :
Inherent characteristics of any ad hoc network such as dynamic topology and limited physical security poses severe security challenges to the network. Hence, these networks demand much stronger security mechanisms than the traditional networks. It is hard to achieve security and robustness in the routing protocols at the same time in such networks. Several issues have to be understood and addressed before devising a security mechanism. This paper targets securing the reactive routing protocol AODV. The routing protocol is vulnerable to two kinds of attack: external and internal attack. We have discussed some existing external attacks and possible malicious behavior from compromised nodes. To mitigate the attacks, we propose a dual level security model. On the first level, we have the external attack detection model (EADM), that secures the network with authentication and confidentiality that rely on mutual trust between nodes. And on the second level, the intrusion detection model (IDM) identifies the misbehaving nodes using the knowledge base and the response model (RM) isolates these nodes from the network.
Keywords :
ad hoc networks; authorisation; data privacy; military communication; mobile computing; mobile radio; routing protocols; telecommunication security; AODV; EADM; IDM; ad hoc networks; authentication; compromised nodes; confidentiality; dual level security model; external attack; external attack detection model; internal attack; intrusion detection model; knowledge base; malicious behavior; military communication; mutual trust; reactive routing protocol; response model; robustness; scalable security schemes; Ad hoc networks; Authentication; Environmental management; Intrusion detection; Mobile ad hoc networks; Mobile computing; Network topology; Robustness; Routing protocols; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILCOM 2002. Proceedings
Print_ISBN :
0-7803-7625-0
Type :
conf
DOI :
10.1109/MILCOM.2002.1179629
Filename :
1179629
Link To Document :
بازگشت