Abstract
Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions.
In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model.
This work was partly supported by: The Spanish Ministry of Science and Education through projects TSI2007-65406-C03-01 “E-AEGIS” and CONSOLIDER CSD2007- 00004 “ARES”, and by the Government of Catalonia under grant 2005 SGR 00446.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bandyopadhyay, S., Coyle, E.J., Falck, T.: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(11), 1218–1229 (2007)
Bettstetter, C.: Topology properties of ad hoc networks with random waypoint mobility. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 50–52 (2003)
Capkun, S., Hubaux, J.-P., Buttyán, L.: Mobility helps security in ad hoc networks. In: MobiHoc 2003 (2003)
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007 (2007)
Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008, pp. 214–219 (2008)
Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science (ENTCS) 171(1), 57–69 (2007)
Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM 2006 (2006)
Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6), 709–721 (2006)
Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks: Attacks and countermeasures. In: SecureComm 2005, pp. 101–112 (2005)
Grossglauser, M., Vetterli, M.: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. In: INFOCOM 2003 (2003)
Hayashibara, N., Cherif, A., Katayama, T.: Failure detectors for large-scale distributed systems. In: SRDS 2002 (2002)
Hyytiä, E., Lassila, P., Virtamo, J.: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 5(6), 680–694 (2006)
Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA). BAA 07-46 LANdroids Broad Agency Announcement (2007), http://www.darpa.mil/IPTO/solicit/open/BAA-07-46_PIP.pdf
Liu, H., Wan, P.-J., Liu, X., Yao, F.: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 18(5), 658–671 (2007)
Luo, J., Hubaux, J.-P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: INFOCOM 2005 (2005)
Mei, A., Stefa, J.: SWIM: A simple model to generate small mobile worlds. In: INFOCOM 2009 (2009)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004 (2004)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commununications of ACM 47(6), 53–57 (2004)
Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: SecureComm 2006 (2006)
Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., Chaintreau, A.: Crawdad data set cambridge/haggle (v. 2006-01-31) (January 2006), http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote/infocom
Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: INFOCOM 2006 (2006)
Striki, M., Baras, J., Manousakis, K.: A robust, distributed TGDH-based scheme for secure group communications in MANET. In: Proceedings of ICC 2004 (2006)
Wang, L., Olariu, S.: A two-zone hybrid routing protocol for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 15(12), 1105–1116 (2004)
Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: INFOCOM 2003 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Conti, M., Di Pietro, R., Gabrielli, A., Mancini, L.V., Mei, A. (2009). The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds) Wired/Wireless Internet Communications. WWIC 2009. Lecture Notes in Computer Science, vol 5546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02118-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-02118-3_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02117-6
Online ISBN: 978-3-642-02118-3
eBook Packages: Computer ScienceComputer Science (R0)